Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The s may be considered as a ...
Linying Su, David W. Chadwick, Andrew Basden, Jame...
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...