Qualitative Reasoning (QR) formalisms provide ontological primitives for capturing conceptual knowledge. Recently QR-based diagrammatic tools are being developed to support learne...
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
A wide range of database applications manage information that varies over time. Many of the underlying database schemas of these were designed using one of the several versions of...
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...