Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Due to inherent privacy concerns, online personalization services such as those offered through toolbars and desktop widgets are characterized by "no-free-disposal" (NFD...
Preemption of low priority call connections to accommodate high priority call connections is a widely recommended technique in a multimedia communication network. A preemption pol...
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
This paper argues that Napoleon, a flexible, role-based access control (RBAC) modeling environment, is also a practical solution for enforcing business process control, or workflo...
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard...