With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
The Semantic Web is gaining immense popularity-and with it, the Resource Description Framework (RDF) broadly used to model Semantic Web content. However, access control on RDF sto...
Arindam Khaled, Mohammad Farhan Husain, Latifur Kh...