Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile P2P systems. However, the nature of mobile devices brings additiona...
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice re...
Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W...
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...