Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
Traditional visits to environments interesting from a cultural point of view are based on technologies that do not permit flexibility and modification to the visit itself on the b...
Maria Elena Bonfigli, Giacomo Cabri, Letizia Leona...
The nature of mobile communication, characterised for example by terminals having poor user interface and limited processing capacity, as well as complex combination of network pr...