Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
The Semantic Web is gaining immense popularity-and with it, the Resource Description Framework (RDF) broadly used to model Semantic Web content. However, access control on RDF sto...
Arindam Khaled, Mohammad Farhan Husain, Latifur Kh...
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...