In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...
Abstract. A verified compiler is an integral part of every security infrastructure. Previous work has come up with formal semantics for sequential and concurrent variants of Java a...
Nowadays the increasing complexity of cars has become a major challenge due to the growing rate of electronic components and software. This trend has an impact on all phases of the...
Applications of Semantic Web technologies often require the management of metalevel information--that is, information that provides additional detail about domain-level informatio...
Thanh Tran, Peter Haase, Boris Motik, Bernardo Cue...