: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...