Abstract. Organizations typically have multiple security policies operating together in the same system. The integration of multiple policies might be needed to achieve the desired...
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
: Container security systems including electronic seals play an important role in securing container logistics. Nevertheless, a lack of standards prevents devices by different vend...