Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
Web is being extensively used for personal expression, which includes ratings, reviews, recommendations, blogs. This user created content, e.g. book review on Amazon.com, becomes ...
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...