Now showing items 1-10 of 49
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development
This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been ...
Security management for mobile ad hoc network of networks (MANoN).
(IGI Publishing, 2010)
Access control mechanism for mobile ad hoc network of networks.
(IEEE Computer Society, 2010-03)
VSHDRP: Vehicle Second Heading Direction Routing Protocol in VANET
Routing protocols in VANET are considered as one of the critical dilemmas that need to be tackled, especially in sparse environment. Thus designing an efficient routing mech- anism has an impact on enhancing the network ...
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities
(EAI Transactions on Secutiry and Safety, 2015-11-28)
Online shopping and banking institutes are a current trend in e-commerce, where online shopping and banking are frequently used over the Internet. With the fast growth of the technology and on-line practices, criminal ...
Concurrent enforcement of usage control policies.
Deriving enforcement mechanisms for policies
Dynamic access control policies and web-service composition.
(IEEE Computer Society, 2005)
Service composition is a fundamental technique for develop- ing web-service applications. In general, a single service is not enough to achieve the user’s goal, rather several services, often from different providers, ...
A compositional event and time-based policy model
Dynamic Access Control Policies - Specification and Verification
(Oxford University Press, 2012)
Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies ...