A configuration management policy specifies the procedures through which a user evolves artifacts stored in a configuration management system. Different configuration management sy...
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
One of the guiding principles of the Grid is local (site) autonomy. Resource owners maintain control over their resources even when those resources are part of a larger Grid. In o...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...