Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...