Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Several data-centric communication paradigms have been proposed in the domain of wireless sensor networks (WSN). Therefore, the principles of operation and maintenance in such net...
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Management applications are sensitive to changes in application and system configuration. This coupling makes it difficult and expensive to develop management applications and kee...
Asham El Rayess, Vidar Vetland, Jerome A. Rolia, J...
—Real-time systems are increasingly used in dynamic changing environments with variable user needs, hosting real-time applications ranging in number and nature. This paper propos...
Ning Gui, Vincenzo De Florio, Hong Sun, Chris Blon...