Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...