Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
We propose a method for dynamic security domain scaling on SMPs that offers both highly scalable performance and high security for future high-end embedded systems. Its most impor...
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...
Most modern computer systems allow the user to control the space allocated to interfaces through a window system. While much of the understanding of how people interact with windo...