Nowadays personal identification is a very important issue. There is a wide range of applications in different spheres, such as video surveillance security systems, control of docu...
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
This paper presents a case study that explores the advantages that can be derived from the use of a design support system during the design of wastewater treatment plants (WWTP). ...
Motivation – This paper is based on a research project which examines the way car drivers and automated devices cooperate to achieve lateral control of a vehicle. A theoretical ...
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...