The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
This paper presents an alternative to current authoring methods for use in distance education. Several commercially available distanceeducation authoring tools are briefly discuss...
James Garvin, Eric Alsheimer, Zak Bradshaw, Peter ...
Web based services and applications have increased the availability and accessibility of information. XML has recently emerged as an important standard in the area of information ...
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...