Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
We consider distributed applications that continuously stream data across the network, where data needs to be aggregated and processed to produce a 'useful' stream of up...
Vibhore Kumar, Brian F. Cooper, Zhongtang Cai, Gre...
Abstract. One of the key factors for effective personalization of information access is the user context. We propose a framework which integrates several critical elements that mak...
Abstract-- While mobile users want to obtain software anywhere and anytime without the knowledge of software availability in advance, software providers want to deploy their softwa...