Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
We present a generic architecture for developing fullyfledged autonomic systems out of non-autonomic components, and investigate how the architecture can be implemented using exi...