Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...
This paper presents a method for modeling the dynamic behavior of harbor supply chains and evaluating strategic and operational policies of the proposed harbor supply chain by app...
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...