As the number of language resources accessible on the Internet increases, many efforts have been made for combining language resources and language processing tools to create new ...
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
This paper defines a framework in which one can formalize a variety of authorization and policy issues that arise in access control of shared computing resources. Instantiations ...
Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart...
We describe the design and the implementation in Java and Jini of a Computational Community, which supports the federation of resources from different organisations. Resources fro...
Nathalie Furmento, Steven Newhouse, John Darlingto...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...