Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
As the vision of ubiquitous computing becomes reality smart devices are embedded into our surroundings and domestic appliances providing services transparently. The nature of such ...
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...