One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
In the present paper a novel system for scalable and personalised media management and its architecture is presented. The proposed solution is based on the creation of a secure an...