With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, ...
The increasing popularity of persistent worlds and the predicted rise of pervasive gaming, both having a strong inherent potential for role-playing, stress a classical challenge o...
Incorporating components from a number of different sources into a given application is generally considered to be a non-trivial activity. Over the years, various coordination mec...
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...