A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Recently, application-level isolation was introduced as an effective means of containing the damage that a suspicious user could inflict on data. In most cases, only a subset of t...
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenge...
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Q...