Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Abstract. We consider a setting with numerous location-aware moving objects that communicate with a central server. Assuming a set of focal points of interest, we aim at continuous...