ls3-www.cs.tu-dortmund.de/cms/medien/publikationen/sacmat2004.pdf
proving their cor- rectness. Examples are discussed in some detail.
Categories and Subject Descriptors D.4.6 [Software]: Operating Systems—Security and Pro- tection; K.6.5 [Computer Milieux]: Management of Com- [...] servers or to redistribute to lists, requires prior specific permission and/or a fee. SACMAT’04,June 2–4, 2004, Yorktown Heights, New York, USA. Copyright 2004 ACM 1-58113-872-5/04/0006 ...$5.00.
companies [...] order to define the security of context–aware applications environment roles have been introduced [4, 5]. In this way some spatial and temporal aspects have already been ad- dressed. The resulting role …