We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
Virtual Prototyping (VP) technique has been interpreted in many different ways, which causes confusion and misunderstanding among researchers and practitioners. Based on a review ...
The use of Shared Virtual Environments is growing in areas such as multi-player video games, military and industrial training, and collaborative design and engineering. At the sam...
Brain-computer interfaces (BCIs) provide a novel form of human-computer interaction. The purpose of these systems is to aid disabled people by aording them the possibility of com...
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...