Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Reference processes are supposed to be the basis for collaboration and mature cooperation in software development. Large business organizations need large and diverse reference pro...
We present a new approach to information flow control (IFC), ploits counterexample-guided abstraction refinement (CEGAR) technology. The CEGAR process is built on top of our existi...
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...