This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
As cloud computing environments become explosively popular, dealing with unpredictable changes, uncertainties, and disturbances in both systems and environments turns out to be on...
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Successful knowledge management results in a competitive advantage in today’s information- and knowledge-rich industries. The elaboration and integration of emerging web-based t...
Christian Hirsch, John G. Hosking, John C. Grundy,...
The objective of YushanNet is to provide a reliable and robust system for hiker tracking in Yushan National Park, Taiwan. The aggregated information can help national parks to pro...