Web-based data sources, particularly in Life Sciences, grow in diversity and volume. Most of the data collections are equipped with common document search, hyperlink and retrieval...
Stephan Heymann, Katja Tham, Axel Kilian, Gunnar W...
Conventional OLTP systems assign each transaction to a worker thread and that thread accesses data, depending on what the transaction dictates. This thread-to-transaction work ass...
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Collaborative information systems in a P2P scenario are characterized by a set of independent peers that dynamically need to cooperate by sharing data and services. For effective c...
Devis Bianchini, Valeria De Antonellis, Michele Me...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...