Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...