Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
Real-time rendering of triangulated surfaces has attracted growing interest in the last few years. However, interactive visualization of very large scale grid digital elevation mo...
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Emerging telecommunication services use, store, or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommun...
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the fol...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, K&ea...