: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Taking care of an elderly in loss of cognitive autonomy is a challenging task. Artificial agents, such as the Telehealth Smart Home (TSH) system can facilitate that task. However,...
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...