![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Automatic evaluation of information provider reliability and expertise
Q&A social media have gained a lot of attention during the recent years. People rely on these sites to obtain information due to a number of advantages they offer as compared to conventional sources of knowled...
-
Chapter and Conference Paper
Trust-Aware RBAC
In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is assoc...
-
Chapter and Conference Paper
Mobile Security with Location-Aware Role-Based Access Control
This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatia...
-
Article
Remote Patient Monitoring Within a Future 5G Infrastructure
Systems of wearable or implantable medical devices (IMD), sensor systems for monitoring and transmitting physiological recorded signals, will in future health care services be used for purposes of remote monit...
-
Article
A survey on peer-to-peer SIP based communication systems
Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information...
-
Chapter and Conference Paper
The Design of Secure and Efficient P2PSIP Communication Systems
Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information...
-
Chapter and Conference Paper
PRIvacy LEakage Methodology (PRILE) for IDS Rules
This paper introduces a methodology for evaluating PRIvacy LEakage in signature-based Network Intrusion Detection System (IDS) rules. IDS rules that expose more data than a given percentage of all data session...
-
Chapter and Conference Paper
A System Architecture for SIP/ IMS-based Multimedia Services
The aim of IP Multimedia Subsystem (IMS) is not only to realize the convergence of the fixed or mobile networks at network level, but also to establish a uni-platform for providing services, no matter which ac...
-
Chapter and Conference Paper
Conformance Checking of RBAC Policy and its Implementation
The purpose a security policy is to specify rules to govern access to system resources preferably without considering implementation details. Both policy and its implementation might be altered, and after intr...