Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...