In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
Over the last decade, the major firms and cultural institutions that have dominated media and information industries in the U.S. and globally have been challenged by people adopti...
In enterprise environment, security becomes increasingly important and costly. Enterprises are struggling to protect the increasing amount of disparate resources. Simple patchwork ...
Chen Zhao, Yang Chen, Dawei Xu, NuerMaimaiti Heili...
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...