Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct point...
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data o...
A major concern in the adoption of cloud infrastructure-asa-service (IaaS) arises from multi-tenancy, where multiple tenants share the underlying physical infrastructure operated ...
Attribute Based Access Control (ABAC) is becoming the reference model for the specification and evaluation of access control policies. In ABAC policies and access requests are de...
Bidirectional programming allows developers to write programs that will produce transformations that extract data from a source document into a view. The same transformations can ...