We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action ...
The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...