The dater equalities constitute a well-known tool which allows the description of Timed Event Graphs in the field of (max, +) algebra. This paper gives an equivalent model in the...
Abdelhak Guezzi, Philippe Declerck, Jean-Louis Boi...
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
The PolicyUpdater1 system is a fully-implemented access control system that provides policy evaluations as well as dynamic policy updates. These functions are achieved by the use o...
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...