Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
This paper describes an initial prototype demonstrator of a Companion, designed as a platform for novel approaches to the following: 1) The use of Information Extraction (IE) tech...
Yorick Wilks, Roberta Catizone, Alexiei Dingli, We...
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Abstract—Contending flows in multi-hop 802.11 wireless networks compete with two fundamental asymmetries: (i) channel asymmetry, in which one flow has a stronger signal, potent...
—We extend the modeling heuristic of [1] to evaluate the performance of an IEEE 802.11e infrastructure network carrying packet telephone calls, streaming video sessions and TCP c...