: Many tools that target parallel and distributed environments must co-locate a set of daemons with the distributed processes of the target application. However, efficient and por...
Dong H. Ahn, Dorian C. Arnold, Bronis R. de Supins...
This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...