Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message t...
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...