Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Over the past several years, the artifact-centric approach to workflow has emerged as a new paradigm of business process modelling. It provides a robust structure of workflow and s...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...