We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
A crucial challenge for improving EMLs is to provide an intuitive notation to support educational practitioners to not only understand, but also describe a large number of flexibl...
Anne Lejeune, Muriel Ney, Armin Weinberger, Margus...
In a small computer science department without a graduate program, it is sometimes difficult to attract research students. This is particularly true for research in computer visio...
ion is a critical concept that underlies many topics in computing science. For example, in software engineering, the distinction between a component’s behavior and its implement...
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...