This paper demonstrates that work in digital enterprises—like work in conventional enterprises— can be carried out effectively by autonomous agents, subject to a regulatory r...
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
The use of CAD in design makes it possible to represent complex components “as manufactured” with a great number of details. A transformation of such models into Finite Elemen...
Gilles Foucault, Philippe M. Marin, Jean-Claude L&...
In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flex...