This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges ...
Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amg...
Business Processes for Web Services (BPEL4WS) are the new paradigms for lightweight enterprise integration. They cross organizational boundaries and are provided by entities that s...
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
We describe the use of a flexible meta-interpreter for performing access control checks on deductive databases. The meta-program is implemented in Prolog and takes as input a datab...
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...