As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Mechanisms that underlie the inductive reasoning process in risk contexts are investigated. Experimental results indicate that people rate the same inductive reasoning argument dif...
Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4CRULES - which enables context-sensitive call control by t...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
The hypermedia field has long realized the need for firstructural abstractions. However, we have failed to generalize the concept of ubiquitous structure management to problem dom...
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...