—in this paper, we present a new policy for admitting Voice over IP (VoIP) sessions over wireless networks. Our proposed policy receives the admission information advertised by t...
—The Common Instrument Middleware Architecture (CIMA) model for Web services based monitoring of remote scientific instruments is being extended and enhanced to provide a capabil...
Douglas du Boulay, Clinton Chee, Kenneth Chiu, Ric...
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...