Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification m...
Anand R. Tripathi, Tanvir Ahmed, Richa Kumar, Shre...
With the move to distributed, component based systems involving reuse of components and services, emergent, system-wide properties, including safety and security in particular, are...
We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from t...
In today's IT-centric, regulated and competitive environment, businesses rely more heavily on IT technologies. Organizations are often challenged by customers, business partn...
Alfred Ka Yiu Wong, Nandan Paramesh, Pradeep Kumar...