Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Existing workflow management systems encapsulate the data and behavior of a process within its execution scope, preventing other processes from accessing this information until th...
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
The research here presented focuses upon the informal, social, and cultural side of managerial coordination and control as manifested in clinical e-health systems. Specifically, t...