A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
We present a framework in which different notions of security can be defined in a uniform and modular way. Each definition of security is formalized as a security predicate by ass...
Recent years have seen a proliferation of secure device pairing methods that try to improve both the usability and security of today's de-facto standard
Iulia Ion, Marc Langheinrich, Ponnurangam Kumaragu...
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...