The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Behavioural models offer the ability to simulate autonomous agents like organisms and living beings. Psychological studies have showed that the human behaviour can be described by...
Abstract: This paper describes a Java-based framework for developing componentbased software systems supporting adaptation with logic laws and considering component interactions as...
Enrico Oliva, Antonio Natali, Alessandro Ricci, Mi...
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...