Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Data streams are a prevalent and growing source of timely data. As streams become more prevalent, richer interrogation of the contents of the streams are required. Value of the con...
Various kinds of data are processed in workflow management systems: from case data to control data, from internal data to access to external databases or documents exchanged in int...
Christian Dreier, Johann Eder, Marek Lehmann, Amir...
In this paper, we follow the role-based access control (RBAC) approach and extend it to provide for the dynamic association of roles with users. In our framework, privileges assoc...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
In order to effectively access the rapidly increasing range of media content available in the home, new kinds of more natural interfaces are needed. In this paper, we explore the ...
Michael Johnston, Luis Fernando D'Haro, Michelle L...