—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
We consider the problem of the exact simulation of random variables Z that satisfy the distributional identity Z L = V Y + (1 − V )Z, where V ∈ [0, 1] and Y are independent, an...
This short paper presents a methodological framework for commentaries from various sources on the same texts allowing them to be assembeled in an intelligent and coherent way. Cat...
This document presents an overview of the Extend modeling environment. Extend is a general purpose graphically oriented discrete event and continuous simulation application with a...
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...