Grid Computing is becoming more popular. The traditional role of the Internet as being an information repository is evolving to become a resource repository. People using the Inte...
John P. Morrison, Sunil John, David A. Power, Neil...
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
We explore an alternative approach to spam based on economic rather than technological or regulatory screening mechanisms. We employ a model of email value which supports two intu...
We take the work practices of fire emergency responders as the basis for developing simulations to teach team coordination. We introduce non-mimetic simulation: economic operation...
Zachary O. Toups, Andruid Kerne, William A. Hamilt...