Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
This paper introduces UniVote, a system supporting mobile phone-based interaction with public displays. The case study carried out at Lancaster University indicates that the campu...
Nick Day, Corina Sas, Alan J. Dix, Motoko Toma, Ch...
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
: The need for demand-driven and scaleable integration of heterogeneous data sources is inherent to the process of genome annotation. In this paper we describe the Gene-EYe archite...