Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
In spite of rapid advances in multimedia and interactive technologies, enterprise users prefer to battle with email spam and overload rather than lose the benefits of communicatin...
Michal Laclavik, Stefan Dlugolinsky, Martin Seleng...
It is indeed important to implement e-Learning platforms for education and training purposes in a variety of domains. However, facing the enormous amount of learning resources, gui...
It is well understood that the key for successful Semantic Web applications depends on the availability of machine understandable meta-data. We describe the Information Grid, a pr...
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...