Abstract. While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable har...
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives t...
Alessandro Acquisti, Roger Dingledine, Paul F. Syv...
A UML model of a software system can be represented by a sequence of model transformations, starting from an empty model. To effectively support the design of complex systems, tra...
Today, the Web is increasingly used as a platform for distributed services, which transcend organizational boundaries to form federated applications. Consequently, there is a grow...