Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
g Service Oriented Abstractions for the Wireless Sensor Grid Edgardo Aviles-Lopez, J. Antonio Garcia-Macias Implementation of OSD Security Framework and Credential Cache Gu Su Kim,...
Agostino Forestiero, Carlo Mastroianni, Fausto Pup...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...