Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...