This paper uses the persistent object system PCLOS to survey some problems and bene ts of object persistence. The system is analyzed along several relevant dimensions. PCLOS provi...
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
The growth of mobile technology has made recording of user’s location possible. The systems that intent to use location in order to register user’s movement and to use the gen...
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
This paper traces the history of policy-based management and how it evolved from the first security models dating back to the late 1960’s until today’s more elaborate framewo...