Proactive contextual information systems help people locate information by automatically suggesting potentially relevant resources based on their current tasks or interests. Such ...
Daniel Billsus, David M. Hilbert, Dan Maynes-Aminz...
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...