—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
This paper describes a context information acquisition framework for a personal device that equips a variety of sensors. The framework captures context information about a user an...
Abstract. The possibility that a database with biometric data is compromised is one of the main concerns in implementing biometric identification systems. In this paper we present...
We present a technique to prove termination of multipath polynomial programs, an expressive class of loops that enables practical traction and analysis. The technique is based on ...
The negotiation of what is to count as mutually acceptable collaborative knowledge is difficult to conduct when participants cannot interact face-to-face. We review certain relate...