Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Though synchronous dataflow (SDF) graph has been a successful input specification language for digital signal processing (DSP) applications, lack of support for global states makes...
The Experimentation Command and Control Interface (XC2I) project has developed an architecture for a Webservice based viewer/controller for use with distributed simulations suppor...
Katherine L. Morse, Ryan Brunton, J. Mark Pullen, ...