Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Java and the Java Virtual Machine (JVM) are a predominant programming language and deployment platform for complex, component-oriented systems. In current standard Java runtime sy...
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterize...