ACT n are ge. subject access ieved. In order to facilitate subject access interoperability a mechanism must be built that allows the different controlled vocabularies to communicat...
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Databases are increasingly being used to store information covered by heterogeneous policies, which require support for access control with great flexibility. This has led to incr...
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...