Recent years saw an increased interest in the use and the construction of large corpora. With this increased interest and awareness has come an expansion in the application to kno...
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
A major source of information for identifying subcellular location on a proteome-wide basis will be imaging of tagged proteins in living cells using fluorescence microscopy. We ha...