We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
Abstract: This paper, entitled Challenges for the Protection of Critical ICTBased Financial Infrastructures for the next 5 years, will describe the outcomes of a recently held work...
Protection monitors synthesized from plan causal structure provide execution systems with information necessary to detect potential failures early during execution. By detecting e...
In this paper, we propose a client side information management method for web services collaboration. Recently, personalization is one of the most challenging topics of the web te...