—In unreliable and untrustworthy systems, information dissemination may suffer network failures and attacks from Byzantine nodes which are controlled by traitors or adversaries, ...
Kai Han, Guanhong Pei, Binoy Ravindran, E. Douglas...
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
In this paper, we present a comprehensive study on the threats towards the coordination services for Web services business activities and explore the most optimal solution to miti...
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Many real-life organizations are hierarchies of largely autonomous, heterogeneous members (individuals or other organizations), often exhibiting rich policies. We restrict our att...