As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Grid technology enables access and sharing of data and computational resources across administrative domains. Thus, it is important to provide a uniform access and management mech...
Jin Wu, Chokchai Leangsuksun, Vishal Rampure, Hong...
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...