We describe a research project for the development of a system for cataloguing, retrieval and interactive manipulation of 30 models of pathological human organs from a distributed...
M. Crudele, Gordon Clapworthy, Meleagros A. Krokos...
The task in expert finding is to identify members of an organization with relevant expertise on a given topic. In existing expert finding systems, profiles are constructed from sou...
Maryam Karimzadehgan, Ryen W. White, Matthew Richa...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
In distributed systems users need to share sensitive objects with others based on the recipients' ability to satisfy a policy. Attribute-Based Encryption (ABE) is a new parad...