We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Abstract—Abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. Considering recent malware, these are only partially cov...
Six basic notions concerning business processes and their supporting information systems are presented and discussed, on the basis of one common theory. This yields that these noti...
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...
A Hybrid modeling approach, combining an analytical model with a radial basis function neural network is introduced in this paper. The modeling procedure is combined with genetic a...
Primoz Potocnik, Igor Grabec, Marko Setinc, Janez ...