Along with increasing investments in new technologies, user technology acceptance becomes a frequently studied topic in the information systems discipline. The last two decades ha...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Information technologies (IT) have spread throughout all areas of modern society. However, the evolution of ethics that guide their use lags behind technological advances [2]. A p...
Carlos Alberto Dorantes, Barbara Hewitt, Tim Goles
This paper describes three important pillars of publishing programs emerging at university libraries: providing a robust publishing platform, engaging the academic community in di...