The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further development of object technology ...
This paper describes an e-Government AI project that provides a range of intelligent AI services to support automated assessment of various types of applications submitted to an i...
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...