Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Recently, social text streams (e.g., blogs, web forums, and emails) have become ubiquitous with the evolution of the web. In some sense, social text streams are sensors of the rea...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of B...
A current research project at the University of Strathclyde is introduced which aims to better understand the role of distributed engineering design in industry and address presen...
Steven P. MacGregor, Avril I. Thomson, Neal P. Jus...
Abstract. Existing middleware is based on control-flow centric interaction models such as remote method invocations, poorly matching the structure of applications that process con...
Rainer Koster, Andrew P. Black, Jie Huang, Jonatha...