Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
A general model of an E-business system comprising an Application Server and a Database engine is analyzed and evaluated. Incoming jobs, once admitted for processing, compete for ...
Giovanna Ferrari, Paul D. Ezhilchelvan, Isi Mitran...
: This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of acces...
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
— In this paper we study the problem of stabilizing a networked control system (NCS) composed of N linear dynamical subplants and an equal number of controllers acting over a sha...