This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
IPsec is the current security standard for the Internet Protocol IP. According to this standard, a selected computer pair (p, q) in the Internet can be designated a “security ass...