As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
— Powered wheelchairs play a vital role in bringing independence to the severely mobility–impaired. Our robotic wheelchair aims to assist users in driving safely, without under...
Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated database...
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...