The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Fast turnaroundtime independabilityevaluation iscrucialfor e cient fault-tolerant system design and dependability of the resulting product since timely feedbacks will allow more i...
Ann T. Tai, Herbert Hecht, Kishor S. Trivedi, Bing...
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
—An energy-efficient, reliable and timely data transmission is essential for wireless sensor networks (WSNs) employed in scenarios where plant information must be available for ...
Pan Gun Park, Carlo Fischione, Alvise Bonivento, K...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. ...
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, ...