We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
Computational database technology spans the two research fields data-base technology and scientific computing. It involves development of database capabilities that support compu...
The Internet has evolved from an information space to a market space with thousands of electronic storefronts, auctions and other commercial services. This market space is not with...
Rosane Maria Martins, Magali Ribeiro Chaves, Luci ...
- This paper presents a placement-driven technology mapping procedure based on fuzzy delay curves. The fuzziness has been introduced to deal with the inherent vagueness in wiring l...
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...