Since XML tends to become the main format to exchange data over the Internet, it is necessary to deļ¬ne a security model to control the access to the content of these documents. S...
This paper presents an innovative method for inserting test points in the circuit-under-test to obtain complete fault coverage for a specified set of test patterns. Rather than us...
This paper presents a framework for generating smoothlooking transformations between pairs of surfaces that may differ in topology. The user controls the transformation by specify...
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...