This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
Semantic Web databases allow efficient storage and access to RDF statements. Applications are able to use expressive query languages in order to retrieve relevant metadata to perfo...
Fabian Abel, Juri Luca De Coi, Nicola Henze, Arne ...
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Abstract-- Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires contin...