Author Organization:Computer Science and EngineeringKeywords:Information SecurityPublication Date:2007Clear