It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
This paper proposes a subjective map representation that enables a robot in a multiagent system to make decisions in a dynamic, hostile environment. A typical situation can be fou...
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
One of the known problems with shared object manipulation in virtual environments is the disruptive effect of network lag in collaboration sessions. Most solutions to this problem...