We present an observational study that was conducted to guide the design and development of technologies to support information flow during nurses' shift change in a hospital...
For self-organising emergent solutions, there is no support to explicitly design system-wide information flows and feedback loops in those flows. This is problematic because the...
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...
Timing side channels are a serious threat to the security of cryptographic algorithms. This paper presents a novel method for the timing-sensitive analysis of information flow in s...