Confinement properties impose a structure on object graphs which can be used to enforce encapsulation properties. From a practical point of view, encapsulation is essential for bu...
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little...
We introduce the concept of Computer Assisted Visual InterActive Recognition (CAVIAR). In CAVIAR, a parameterized geometrical model serves as the human-computer communication chan...