Web image search engine has become an important tool to organize digital images on the Web. However, most commercial search engines still use a list presentation while little effo...
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Abstract. Query rewriting method is proposed for the heterogeneous information integration infrastructure formed by the subject mediator environment. Local as View (LAV) approach t...
Leonid A. Kalinichenko, Dmitry O. Martynov, Sergey...