Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Abstract. Web accessibility and usability problems can make evaluation difficult for non-experts who may be unfamiliar with assistive technology. Developers often (i) lack easy acc...