Many safety-related systems are built from generic software which is customised to work in a particular situation by static configuration data. Examples of such systems are railwa...
A. G. Faulkner, P. A. Bennett, R. H. Pierce, I. H....
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...