Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
—The vision of network robot systems involves robots embedded in smart environments, with which they can collaborate and communicate. In such systems, robots have access to many ...
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...