In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...
As part of the new security environment at the nation's airports, discrete event simulation modeling was applied shortly after 9-11 to understand the operational dynamics of ...
David R. Pendergraft, Craig V. Robertson, Shelly S...
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
: Publish/Subscribe infrastructures have gained significant traction recently with several specifications such as the Java Message Service (JMS), WS-Eventing and WS-Notification. I...
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...