In spite of many standards efforts, Web services with similar or compatible functionalities often have heterogeneous semantics. One reason is the disparate ontologies used for ser...
Jingshan Huang, Rosa Laura Zavala Gutierrez, Benit...
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
With the increasing popularity of mobile computing platforms such as personal digital assistants (PDAs) and smart mobile phones, applications originally designed for higherperform...
Supporting a rich array of information sources is a key element to making highly mobile computing devices usable by the wider community. It is our belief that there will not be on...
Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne...
Even though IPv6 has been developed for more than a decade, IPv4 is still the most commonly adopted network protocol. However, the significant changes in the new version may cause...
Recently, a receipt-free scheme is rising for a secure eauction. The goal of a receipt-free scheme in an eauction is to prevent a bid-rigging. If the bid-rigging happens in the e-...
Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the...
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
A re-ranking technique,called “PageRank brings a successful story behind the search engine. Many studies focus on finding an way to compute the PageRank scores of a large web gr...
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...