Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Computer Security Test
Cryptography
CIS13: Federation Protocol Cross-Section
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Security and E-Commerce
LEAD Portal: a TeraGrid Gateway and Application Service Architecture Marcus Christie and Suresh Marru Indiana University LEAD Project ()
Security in Mobile Ad Hoc Networks Security Protocols and Applications Seminar Rudi Belotti, Frank Lyner April 29, 2003.
SCSC 455 Computer Security Chapter 4 Key Distribution and User Authentication Dr. Frank Li.
Http://iamsect.ncl.ac.uk/ Introduction to Shibboleth and the IAMSECT Project.
Forces: Business needs dynamic re-configuration, adaptation and scalability of applications. Automation of data processing and data-driven systems. Event-Driven.