Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
In this paper we consider e-mail as a task management tool. Our general goal is to restructure the domain of e-mail. The purpose is to make e-mail even more suitable for messageba...
We present an interactive modeling and animation system that facilitates the integration of a variety of simulation and animation paradigms. This system permits the modeling of di...
Robert C. Zeleznik, D. Brookshire Conner, Matthias...
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based...