The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
Traditional techniques for a distributed web server design rely on manipulation of central resources, such as routers or DNS services, to distribute requests designated for a sing...
Mobile information community develops quickly, as mobile telecommunication technology matches to the third generation. XML-based GIS becomes a global standard and the foundation. R...