We present an observational study that was conducted to guide the design and development of technologies to support information flow during nurses' shift change in a hospital...
For self-organising emergent solutions, there is no support to explicitly design system-wide information flows and feedback loops in those flows. This is problematic because the...
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
A common feature of congestion control protocols is the presence of information packets used to signal congestion. We address here the question of how frequently such protocols nee...
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...