Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
The quality of information is crucial for decision making in many mission-critical applications such as battlefield operations and intelligence analysis. However, as the system b...
Bin Yu, Srikanth Kallurkar, Ganesh Vaidyanathan, D...
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...