This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared ...
Anil Kumar Venkataiahgari, Mourad Debbabi, J. Will...
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
- Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also commo...
Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any ti...
Manoj B. Sastry, Michael J. Covington, Deepak J. M...