In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Half the world’s population is expected to live in urban areas by 2020. The high human density and changes in peoples’ consumption habits result in an everincreasing amount of...
Inbal Reif, Florian Alt, Juan David Hincapié...
Peer-to-Peer (P2P) technology is regarded as being disruptive for traditional fixed and mobile operators. However, it can also be considered as an opportunity for new ways of serv...
Wolfgang Kellerer, Zoran Despotovic, Maximilian Mi...
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
To provide data consistency in the presence of failures and concurrency, database methods will continue to be important to the processing of shared information in a mobile computi...