Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
This paper describes several methods for using the Virtual Reality Modeling Language (VRML) as the visualization integration technology for manufacturing simulation systems. One o...
This paper introduces the notions of mask and multiple format for setting up a progressive access to information in an Information System. Masks consist of more or less complete r...
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...