Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...