In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
The imminent mass deployment of pervasive computing technologies such as sensor networks and RFID tags, together with the increasing participation of the Web community in feeding ...
Gabriella Castelli, Alberto Rosi, Marco Mamei, Fra...
A growing number of users in Web 2.0 based social network sites and photo sharing portals upload millions of images per day. In many cases, this leads to serious privacy threats. ...
Thorben Burghardt, Andreas Walter, Erik Buchmann, ...
Abstract—A growing number of applications start using Semantic Web technologies. The base concept in this technology is the use of ontologies, allowing first-order logic reasoni...
Mobile hypermedia applications combine the well-known advantages of the navigational paradigm of the Web with the capabilities of location-aware software. However, there are some s...