In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however, it introduces several s...
We investigate the use of a thin-client based configuration in providing students with universal access to a centralized, graphical computing environment. The primary goal is to ...