Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
Efficient data management is a key component in achieving good performance for scientific workflows in distributed environments. Workflow applications typically communicate data be...
Metacomputing allows the exploitation of geographically seperate, heterogenous networks and resources. Most metacomputers are feature rich and carry a long, complicated installati...
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Traditional "realistic" theories of social action, whether based on the individual gain heuristics of capitalism or the collective class struggles of communism, cannot e...