Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Dynamic AOP has been identified as a useful technique to implement an auto-adaptive framework. To supplement this policies based upon EventCondition-Action rules are used to specif...