Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
An overview of some recent advances in distributed information processing for control over wireless sensor networks is presented in this paper. Firstly, a taxonomy of fundamental ...
Carlo Fischione, Karl Henrik Johansson, Fabio Graz...
We describe the class of games with opacity condition, as an adequate model for security aspects of computing systems. We study their theoretical properties, relate them to reachab...
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...