Outdoor location systems based on Wireless Access Point (WAP) signal strength must either know the exact location of the WAPs in order to use a triangulation algorithm, or must co...
Kay Connelly, Yong Liu, Dan Bulwinkle, Adam Miller...
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deï¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...