In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
With the rapid growth of emerging demand and deployment of wireless LAN (WLAN), much of traffic including multimedia traffic is forced to travel over WLAN. Since the legacy IEEE 80...
Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Kyunghun...
Addresses are the most common georeferencing resource people use to communicate to others a location within a city. Urban GIS applications that receive data directly fromcitizens,...
Creating and maintaining software systems is a knowledge intensive task. One needs to have a good understanding of the application domain, the problem to solve and all its require...
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...