The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these ...
Jungwon Kim, William O. Wilson, Uwe Aickelin, Juli...
Abstract. The dependency core calculus (DCC), a simple extension of the computational lambda calculus, captures a common notion of dependency that arises in many programming langua...
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
Distributed computing in wide area networks requires special approach to solve the problem of communication between secure areas. Since there is no possibility to establish connect...
Jacek Midura, Kazimierz Balos, Krzysztof Zielinski
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...