Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
This paper describes the starting points of how to design and build tools to help individual users track and monitor their presence on the web from the standpoints of individual p...
Markus Bylund, Jussi Karlgren, Fredrik Olsson, Ped...
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...