Provenance Management Overview Provenance refers to the chain of successive custody—including sources and operations of resources such as hardware, software, […]
TrustStoreTM We cannot take the things we treasure with us everywhere we go. Sometimes we do not even have room […]
Security and privacy protections are needed to increase the confidence on the wide deployment of Internet of Things (IoT) applications. […]
Database services in the cloud are attracting more companies to outsource their databases, since in this way the companies do […]
Passwords are susceptible to observation, i.e., someone watching a user, either directly or through a hidden camera, typing his/her password […]
You need to know what is happening around you in order to set up appropriate defences. That is why we […]
Smartphone usage is increasing and at present most of us use smartphone. The usage of a smartphone is tightly associated […]
All organisations need to comply with legislation or codes of conduct. These tend to be complex, and it is a […]
A simulator for Wireless Sensor Networks (WSN), Body Area Networks (BAN), and generally networks of low-power embedded devices. It offers […]