In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Electronic commerce is emerging as a major Websupported application. In this paper we argue that database technology can, and should, provide the backbone for a wide range of such...
Serge Abiteboul, Bernd Amann, Sophie Cluet, Anat E...
Level of Web experience is often a factor for which researchers attempt to control while conducting experimental studies on Web usability. It is typically measured by some means o...
Ann Chadwick-Dias, Donna P. Tedesco, Thomas S. Tul...
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Pervasive Computing has postulated to invisibly integrate technology into everyday objects in such a way, that these objects turn into smart things. Not only a single object of thi...