Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...
: Radio Frequency Identification (RFID) technology has a lot of potential to bridge the gap between the virtual world of enterprise IT systems and the real world of products and l...
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
We studied files stored by members of a work organization for patterns of social commonality. Discovering identical or similar documents, applications, developer libraries, or oth...
John C. Tang, Clemens Drews, Mark Smith, Fei Wu, A...