Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
Volunteer Computing (VC) is a paradigm that takes advantage of idle cycles from computing resources donated by volunteers and connected through the Internet to compute large-scale...
Declarative policies play a central role in many modern software systems. Engineering policies and their interactions with programs raises many interesting open questions. Categor...
Kathi Fisler, Shriram Krishnamurthi, Daniel J. Dou...
This paper discusses the challenges of putting Apple Macintosh OSX into open access and computer lab environments. Categories and Subject Descriptors K.6.4 [Management of Computin...
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...