Open learner models (OLM) enable users to access their learner model to view information about their understanding. Opening the learner model to the learner may increase their perc...
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
A typical software development team leaves behind a large amount of information. This information takes different forms, such as mail messages, software releases, version control ...
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...