Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
Continuous or high-speed manufacturing equipment is an integral part of the food and beverage, pharmaceutical, and consumer products industries. For many years, these industries h...
Andrew J. Siprelle, Richard A. Phelps, M. Michelle...
We describe the design and the implementation in Java and Jini of a Computational Community, which supports the federation of resources from different organisations. Resources fro...
Nathalie Furmento, Steven Newhouse, John Darlingto...
We present extensions and modifications that we have made to a cursorless menu navigation interface that is controlled by multiple pressure-sensitive linear strips. Our approach i...