We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
A biometric system produces a matching score representing the degree of similarity of the input with the set of templates for that user. If the score is greater than a prefixed th...
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
This paper describes an asynchronous state-machine replication system that tolerates Byzantine faults, which can be caused by malicious attacks or software errors. Our system is t...
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...