Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
This paper presents a specifically database-inspired approach (called DOGMA) for engineering formal ontologies, implemented as shared resources used to express agreed formal semant...
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Abstract. With increasing usage of Social Networks, giving users the possibility to establish access restrictions on their data and resources becomes more and more important. Howev...
In this paper, we present a study of responses to the idea of being recorded by a ubicomp recording technology called SenseCam. This study focused on real-life situations in two N...
David H. Nguyen, Gabriela Marcu, Gillian R. Hayes,...