Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
Abstract. Robot soccer is a challenging research domain, which involves multiple agents (physical robots or ”softbots”) to work together in a dynamic, noisy, cooperative and ad...
Hui Wang, Han Wang, Chunmiao Wang, William Y. C. S...
To rapidly evolve new designs of peer-to-peer (P2P) multimedia streaming systems, it is highly desirable to test and troubleshoot them in a controlled and repeatable experimental ...
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...