2

JustAct: Actions Universally Justified by Partial Dynamic Policies

Towards a Purpose-Based Access Control Model Derived from the Purpose Limitation Principle

Costly incentives design from an institutional perspective: cooperation, sustainability and affluence

Incentives are usually introduced by the regulator entity (third-party), to promote cooperation in a market. The implementation of incentives is always costly and thus might fail to be enforced sustainably. This work aims at exploring the effects of …

Cost-optimized, data-protection-aware offloading between an edge data center and the cloud

An edge data center can host applications that require low-latency access to nearby end devices. If the resource requirements of the applications exceed the capacity of the edge data center, some non-latency-critical application components may be …

Decentralized application placement in fog computing

In recent years, cloud computing concepts have been extended towards the network edge, leading to paradigms like edge computing and fog computing. As a result, applications can be placed on a variety of resources, including fog nodes and cloud data …

Dynamic generation of access control policies from social policies

Promises and pitfalls of computational modelling for insurgency conflicts

Insurgency conflicts pose significant challenges to societies globally. The increase of insurgency conflicts creates a need to understand how insurgencies arise, and to identify societal drivers of insurgencies or effective strategies to counter …

Algorithmic fog of war: When lack of transparency violates the law of armed conflict

Under international law, weapon capabilities and their use are regulated by legal requirements set by International Humanitarian Law (IHL). Currently, there are strong military incentives to equip capabilities with increasingly advanced artificial …

An Instruction Set Extension to Support Software-Based Masking

In both hardware and software, masking can represent an effective means of hardening an implementation against side-channel attack vectors such as Differential Power Analysis (DPA). Focusing on software, however, the use of masking can present …

Guest Editors’ Introduction: Special Issue on Top Picks in Hardware and Embedded Security