Skip to main content

Authentication, Authorization and Auditing in Real-World Systems

This special issue will explore security aspects of systems, in particular the new challenges that established concepts such as authentication, authorization and auditing face. To secure modern systems, many sub-specializations of information security are necessary, among them network security, embedded software security and hardware security. 

This special series originates from the 11th International Conference on Availability, Reliability and Security which was held in August 2016 at the University of Applied Sciences, Salzburg, Austria. It publishes some key contributions presented at the conference describing different aspects of availability, reliability and security with a focus on large-scale systems, as well as other contributions.

Edited by: Edgar Weippl

  1. Focused crawlers enable the automatic discovery of Web resources about a given topic by automatically navigating through the Web link structure and selecting the hyperlinks to follow by estimating their releva...

    Authors: Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis and Ioannis Kompatsiaris
    Citation: EURASIP Journal on Information Security 2017 2017:11