Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
: Desktop management is probably the most resource-consuming task for the typical operations and support team, regardless of being frequently overlooked as not as complex or specia...
Recently there has been renewed interest in building reliable servers that support continuous application operation. Besides maintaining system state consistent after a failure, o...
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
We present a Scalable Distributed Information Management System (SDIMS) that aggregates information about large-scale networked systems and that can serve as a basic building bloc...