: A test procedure for testing mainly the boundary scan cells, and testing partially the test access port controller in programmable logic devices, and field programmable gate arra...
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...