Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Biodiversity databases have recently become widely available to the public and to other researchers. To retrieve information from these resources, users must understand the underl...
Bongshin Lee, Cynthia Sims Parr, Dana Campbell, Be...
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...
A large proportion of the massive amounts of data that are being collected by many organisations today is about people, and often contains identifying information like names, addre...
When we model a phenomenon we apply a perspective on the phenomenon. The perspective decides which properties we include in the model. It also decides how we conceive a phenomenon ...