As knowledge gains a reputation for being a critical resource in the information-intensive economy, organizations have doubled their efforts in trying to extract value from knowle...
Chee-Wee Tan, Shan Ling Pan, Eric Tze Kuan Lim, Ca...
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
This paper introduces the Ponder language for specifying distributed object enterprise concepts. Ponder, is a declarative language, which permits the specification of policies in ...
Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemo...
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...