may be saved for later reuse of material, but also to preserve the historical perspective of work done [ha:92]. In particular, in distributed and collaborative hypertext systems, v...
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
During the 1980's there was a lot of activity in the area of Statistical Databases, focusing mostly on socio-economic type applications, such as census data, national product...
2.5G and 3G cellular networks are becoming more and more widespread. Therefore, the need for value added services is increasing rapidly. One of the key services that operators see...