Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
Intelligent monitoring facilities are of paramount importance in both service and network management as they provide the capability to monitor quality of service and utilisation pa...
George Pavlou, Kevin M. T. McCarthy, George Mykoni...
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Several multiagent reinforcement learning (MARL) algorithms have been proposed to optimize agents' decisions. Due to the complexity of the problem, the majority of the previo...
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...