—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
In this paper, we discuss the use of formal requirementsengineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to repr...
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Bri...
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...