—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Current network management architectures are using different models to define management information objects. These definitions actually also include, in a non-formal way, the defi...
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Background: Information obtained by DNA microarray technology gives a rough snapshot of the transcriptome state, i.e., the expression level of all the genes expressed in a cell po...
This work focuses on scenarios that require the storage of large amounts of data. Such systems require the ability to either continuously increase the storage space or reclaim spa...