Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
The design and development process of communication protocols and real-time systems and particularly transport protocol mechanisms requires adequate methodology and efficient ins...
The otolith organs in the vestibular system are excellent detectors of linear accelerations. However, any measurement of linear acceleration is ambiguous between a tilt in a gravi...
Chris Eliasmith, M. Brandon Westover, Charles H. A...