In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Abstract. Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems ...
Guillermo Navarro, Jose A. Ortega-Ruiz, Joan Ametl...
Interactive experiences benefit from natural interactions, compelling communication, and ease of implementation. We show how, according to these principles, interactive media arch...
Flavia Sparacino, Glorianna Davenport, Alex Pentla...
In this paper we present an authorization mechanism for a relational database. It allows defining the user privileges exact to a table row. To implement that we used the INSTEAD t...
— Rapid advancements in processor and networking technologies have led to the evolution of cluster and grid computing frameworks. These high-performance computing environments ex...
Pradeep Padala, Cyrus Harrison, Nicholas Pelfort, ...