A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
– Networked enterprises create virtual teams of distributed experts belonging to different enterprises where one user can be part of multiple teams; How to effectively control th...
Ahmad Kamran Malik, Hong Linh Truong, Schahram Dus...
Radio Frequency Identification (RFID) technologies can potentially improve the productivity of retailers. In this paper, we propose a role-based, enterprise-level, RFID-oriented p...
Haifei Li, Patrick C. K. Hung, Jia Zhang, David Ah...
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...