Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...