—Socio-technical systems differ from typical MAS formulations in that efficiency of the system is not the only concern of the participating agents. Human attributes such as conc...
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data o...
A major concern in the adoption of cloud infrastructure-asa-service (IaaS) arises from multi-tenancy, where multiple tenants share the underlying physical infrastructure operated ...
Attribute Based Access Control (ABAC) is becoming the reference model for the specification and evaluation of access control policies. In ABAC policies and access requests are de...
Bidirectional programming allows developers to write programs that will produce transformations that extract data from a source document into a view. The same transformations can ...
With the advent of various collaborative sharing mechanisms such as Grids, P2P and Clouds, organizations including private and public sectors have recognized the benefits of bein...
Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doup&ea...
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. W...
Inspired by the access control models of social network systems, Relationship-Based Access Control (ReBAC) was recently proposed as a general-purpose access control paradigm for a...
Syed Zain R. Rizvi, Philip W. L. Fong, Jason Cramp...
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes ...
Claudio Soriente, Ghassan O. Karame, Hubert Ritzdo...
Abstract—Multi-level inclusive caches are often used in multicore processors to simplify the design of cache coherence protocol. However, the use of such cache hierarchies poses ...