Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Since its formalization RBAC has become the yardstick for the evaluation of access control formalisms. In order to meet organizational needs, it has been extended along several di...
Philippe Balbiani, Yannick Chevalier, Marwa El Hou...
The widespread availability of devices with multiple wireless interfaces and the abundance of heterogeneous positioning techniques open new market potentials for Location Based Se...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...