This paper describes a dynamic service reconfiguration model where the proxy is composed of a chain of service objects called mobilets (pronounced as mo-be-lets), which can be dep...
Siu Nam Chuang, Alvin T. S. Chan, Jiannong Cao, Ro...
In a world where all devices will be interconnected, the boundaries between the different devices will start to disappear. Devices will be able to access each other's applica...
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical appl...