Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Search engine-based features are a basic interaction mean for users to find information inside a Web-based Learning Management Systems (LMS); nonetheless, traditional solutions la...
Alessandro Bozzon, Tereza Iofciu, Wolfgang Nejdl, ...
Concurrent software is difficult to verify. Because the thread schedule is not controlled by the application, testing may miss defects that occur under specific thread schedules. T...