It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
The importance of educating organizational end users about their roles and responsibilities towards information security is widely acknowledged. However, many current user educati...
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
This project describes the continuing development of a Privacy Label to present to consumers the ways organizations collect, use, and share personal information. Several studies h...
Ownership domain annotations express and enforce design intent related to object encapsulation and communication directly in real object-oriented code. First, this work will make ...