Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Abstract: Observation is a fundamental interaction pattern in today's computerbased systems. Adopting observation as the main modelling criterion, computer-based systems can b...
: With the advent of Optical Networks, an important opportunity for the application of Telecommunication Management Network (TMN) framework emerges. At present, most such networks ...
Abilio Carvalho, Fausto de Carvalho, George Pavlou