Information dissemination in electronic form has improved drastically over the past few years. New technologies in web feeds allow the uses to get notified automatically when new...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
We present a connectionist architecture that supports almost instantaneous deductive and abductive reasoning. The deduction algorithm responds in few steps for single rule queries...