The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
We introduce ideas, proposed technologies, and initial results for an office of the future that is based on a unified application of computer vision and computer graphics in a sys...
Ramesh Raskar, Greg Welch, Matt Cutts, Adam Lake, ...
Nowadays, economy, security and quality of life heavily depend on the resiliency of a number of critical infrastructures, including the Electric Power System (EPS), through which ...
Silvano Chiaradonna, Paolo Lollini, Felicita Di Gi...