—This article shows to what extent it is possible to develop a public simple mechanism for hiding information in natural language by means of the use of templates and manual anno...
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
With the vigorous development of the Internet, web applications have been widely used on the PC (Personal Computer) platforms. The maturity of the hardware and software platforms ...
—“Network Storage and System Virtualization Technologies” is an up-to-date course opened by the school of electronics engineering and computer science of Peking University. T...
Android which Google released as an open-source mobile phone operating system is a Linux-based platform; it consists of the operating system, middleware, and user interface and ap...
This paper investigates the energy-saving organization of sensor nodes in large wireless sensor networks. Due to a random deployment used in many application scenarios, much more n...
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...