The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
In this paper, a teleservice for archiving and retrieving multimedia documents using public networks is described. This teleservice encourages a broad range of commercially applic...
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Abstract. The rapid increase on the circulation of data over the web has highlighted the need for distributed storage of Internet-accessible information due to the rapid increase o...