Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Business matching and collaboration support systems are useful, in particular for small-and-medium companies. Most of them developed so far are based on the server-client architect...
Abstract. Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on...
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...