In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
Science disciplines are experiencing a data avalanche. As a result, scientific research is limited by data analysis and visualization capabilities. We have been working closely wi...
Kai Li, Matthew A. Hibbs, Grant Wallace, Olga G. T...
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for performing node selection based on network location. The framework consists of an overla...
In recent years different institutions have launched several telemedicine projects which aimed to encourage the Euro-Mediterranean cooperation. The creation of a Virtual Euro-Medit...
Georgi Graschew, Theo A. Roelofs, Stefan Rakowsky,...
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...