A prominent trend in the software industry in the late 1990s was the development of the application service providing business model. Application service providers (ASP)1 offer th...
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Abstract. As low-level architectural support for context-aware computing matures, we are ready to explore more general and powerful means of accessing context data. Information req...
Jeffrey Heer, Alan Newberger, Chris Beckmann, Jaso...
Abstract. Using graphical description techniques for formal system development has become a common approach in many tools. Often multiple description techniques are used to represe...
This paper describes how query formulation can be made simple and less complicated by using ontologies. It takes a brief look at several advantages of using ontologies in a distri...