In its current state, the Internet does not provide end users with
trans...
Recently proposed systems aim at achieving privacy using locality-sensit...
Snapshot isolation (SI) is a prevalent weak isolation level that avoids ...
We provide a framework consisting of tools and metatheorems for the
end-...
The relational calculus (RC) is a concise, declarative query language.
H...
Digital authentication is a mature field, offering a range of solutions ...
Security Enhanced Linux (SELinux) is a security architecture for Linux
i...
Lighthouse projects such as CompCert, seL4, IronFleet, and DeepSpec have...
The purpose of testing a system with respect to a requirement is to refu...
EMV is the international protocol standard for smartcard payment and is ...
This document describes and analyzes a system for secure and
privacy-pre...
In voting, disputes arise when a voter claims that the voting authority ...
We present an approach for verifying systems at runtime. Our approach ta...
A myriad of access control policy languages have been and continue to be...
Cardinality estimators like HyperLogLog are sketching algorithms that
es...
Mobile communication networks connect much of the world's population. Th...
Databases can leak confidential information when users combine query res...
Role mining tackles the problem of finding a role-based access control (...