Lehigh University has recently implemented a new PC deployment model which is built around the Universal Imaging Utility, a product of Big Bang, LLC. This model has allowed Lehigh...
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Healthcare organizations consist of a large number of disparate information systems (IS). These have been deployed to support specific needs of healthcare organisations. The infor...
Abstract. Many surveillance cameras are being installed throughout the environments of our daily lives because they effectively maintain safety and offer security to ordinary peopl...