We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
The Dependency Core Calculus (DCC) is an extension of the computational lambda calculus that was designed in order to capture the notion of dependency that arises in information-f...
Content-based publish/subscribe (pub/sub) is a promising paradigm for building asynchronous distributed applications. In many application scenarios, these systems are required to ...
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...