Different classes of information system stakeholders depend on different values to be successful. Understanding stakeholders’ value dependencies is critical for developing softw...
Di Wu, Qi Li, Mei He, Barry W. Boehm, Ye Yang, Sup...
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Various code certification systems allow the certification and static verification of important safety properties such as memory and control-flow safety. These systems are valuabl...
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...