There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Abstract. We present protocols for distributed computation of relational intersections and equi-joins such that each site gains no information about the tuples at the other site th...
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
This paper provides an examination of an emerging class of security mechanisms often referred to as deception technologies or honeypots. It is based on our experience over the last...
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to build applications that can configure themse...
Kenneth P. Birman, Robbert van Renesse, James Kauf...