The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
The Neurovisualization Lab at the University of Virginia is developing the Integrated Remote Neurosurgical System (IRNS) to allow mentoring of neurosurgical procedures in remote l...
B. Sean Graves, Joe Tullio, Minyan Shi, J. Hunter ...
Middleware technologies, often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system...
Alan Dearle, Scott M. Walker, Stuart J. Norcross, ...
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...