We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is ļ¬rst stored in some type of computer memory and then deleted. We ...
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
Eļ¬ective human teams often beneļ¬t from proactivity through membersā capability of anticipating diļ¬erent needs of teammates. In this paper, we focus on three issues related...
John Yen, Xiaocong Fan, Shuang Sun, Rui Wang, Cong...
We consider the problem of reconstructing a compact 3manifold (with boundary) embedded in R3 from its crosssections with a given set of cutting planes having arbitrary orientation...
In this paper, we look at a supply chain of commodity goods where customer demand is uncertain and partly based on reputation, and where raw material replenishment is uncertain in...