This paper presents λI , a language for dynamic tracking of information flow across multiple, interdependent dimensions of information. Typical dimensions of interest are integr...
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...