Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide...
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Abstract. A mobile robot that interacts with its environment needs a machineunderstandable representation of objects and their usages. We present an ontology of objects, with gener...
Eric Wang, Yong Se Kim, Hak Soo Kim, Jin Hyun Son,...
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...