publié le: October 2009
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, control-flow integr...
We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions...
In this article, we propose an access control mechanism for Web-based social networks, which adopts a rule-based approach for specifying access polic...
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is twofold: (i) We propose a simple, formal defi...
We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks are based on the blind source separation algorit...