Abstract: This paper describes our work on designing and implementing a component for automatically integrating and updating information about configuration items into a Semantic W...
As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the co...
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...