Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Recently, social text streams (e.g., blogs, web forums, and emails) have become ubiquitous with the evolution of the web. In some sense, social text streams are sensors of the rea...
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of B...
A current research project at the University of Strathclyde is introduced which aims to better understand the role of distributed engineering design in industry and address presen...
Steven P. MacGregor, Avril I. Thomson, Neal P. Jus...