This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
The growing disparity between processor and memory speeds has caused memory bandwidth to become the performance bottleneck for many applications. In particular, this performance g...
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...
We investigate a new approach for solving boundary control problems for dynamical systems that are governed by transport equations, when the control function is restricted to binar...