Aljosa Pasic

  • Citations Per Year
Learn More
ing is permitted with credit to the source. Libraries are permitted to photocopy or print, providing the reference is mentioned and that the resulting material is made available at no cost. Reference should mention: International Journal on Advances in Security, issn 1942-2636 vol. 2, no. 2&3, year 2009, http://www.iariajournals.org/security/ The copyright(More)
Organizations are subject to a number of regulations, internal policies and best practices and standards, and in the context of the Future Internet, Enterprise Systems will look for increased collaboration to make use of dynamically composed services. Compliance to regulations and policies becomes an important problem from the security and trust standpoint,(More)
The emergence of new type of sensors and surveillance devices, such as drones (unmanned aerial vehicles -- UAV), combined with the need to migrate to interoperable and cross-border solutions for wide area surveillance (WAS), represents an opportunity to rethink previously separated cyber and physical security systems and to built-in cybersecurity(More)
Businesses today have more than ever a sharp focus on reducing capital and operational expenses. Business Process Outsourcing (BPO), Knowledge Process Outsourcing (KPO) and adoption of shared service models have all increased on a global scale. This results in an emerging complexity and volatility of business relationships. As the future internet of(More)
Identity federation provides a powerful way for managing sensible information of its users. However, as the number of members increases, the management of the policies defined by the federation is becoming more and more complex. In this paper, we present a mechanism to manage this complexity by means of the administrative delegation. This allows(More)
  • 1