Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital objects. To meet these requirements, we present a new access control model–Times-bas...
Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaoli...
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
Modern Web sites provide multiple services that are often deployed through distributed architectures. The importance and the economic impact of Web-based services introduces signi...
Mauro Andreolini, Sara Casolari, Michele Colajanni
Abstract—When an emergency happens, public communication networks, including cellular networks, public switched telecommunication networks, and the Internet can be utilized to su...