Now showing items 1-10 of 77
Verification and enforcement of access control policies
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain ...
Data confidentiality in mobile ad hoc networks.
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes ...
An Extended Stable Marriage Problem Algorithm for Clone Detection
(International Journal of Software Engineering & Applications (IJSEA), 2014)
Code cloning negatively affects industrial software and threatens intellectual property. This paper presents a novel approach to detecting cloned software by using a bijective matching technique. The proposed approach ...
Runtime-Monitoring for Industrial Control Systems
Critical Theory as an Approach to the Ethics of Information Security
A model-based approach for RFID application testing