A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law - the so called anti-circumvention provisions....
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...