In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they ...
This paper shows how a general purpose data flow visual programming environment can be effectively used to find, collect and manipulate information available on the web. The discu...