Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Our work with communities in developing countries suggests that HCI practice is a long way from maturity in these contexts. With this SIG, we are seeking to build on a CHI2007 work...
Mike Best, Andrew M. Dearden, Susan M. Dray, Ann L...
Seamless exchange of models among different modeling tools increasingly becomes a crucial prerequisite for the success of modeldriven engineering. Current best practices use model ...
Gerti Kappel, Horst Kargl, Thomas Reiter, Werner R...
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...