Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Security is a critical component of grid systems and while there are numerous software components and tools that provide some capabilities relating to security, there are few comp...
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
—We discuss a general architectural approach to knowledge and information management and delivery in distributed systems. Our approach is based on the recognition that time-stamp...
Geoffrey Fox, Mehmet S. Aktas, Galip Aydin, Andrea...
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...