We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Many data base applications require the storage and manipulation of different versions of data objects. To satisfy the diverse needs of these applications, current database system...
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Abstract— In wireless sensor networks, one of the big challenges is to achieve a satisfactory network lifetime while meeting quality of service (QoS) requirements. In this paper,...
Zhiwen Wan, Jinsong Zhang, Hao Zhu, Kia Makki, Nik...