Learn More
Workflows capture complex operational processes and include security constraints limiting which users can perform which tasks. An improper security policy may prevent certain tasks being assigned and may force a policy violation. Deciding whether a valid user-task assignment exists for a given policy is known to be extremely complex, especially when(More)
This paper explores the need for a collaborative development tool to allow information security experts to capture their interrelated knowledge in an ontology. Such a tool would enable organisations to make more informed security policy decisions around shared security issues. However, population of ontologies can be time-consuming and error-prone, and(More)
Workflows are complex operational processes that include security constraints restricting which users can perform which tasks. An improper user-task assignment may prevent the completion of the work-flow, and deciding such an assignment at runtime is known to be complex, especially when considering user unavailability (known as the resiliency problem).(More)
This paper explores the need for a collaborative editing tool to allow information security and human factors experts to capture their interrelated knowledge in a dedicated ontology. Population of such an ontology would enable organisations to make more well informed security policy decisions. Currently ontology development is facilitated by generic(More)
This paper explores current printer identification techniques which allow the origins of a printed document to be established. The printer used to create a particular document can be traced by using unique and hidden information contained within that document. Printer identification can ultimately lead to the printer's owner(s) which provides a valuable(More)
We report the case of a young girl with recurrent bladder dysfunction. Magnetic resonance imaging performed for evaluation of initial urologic symptoms revealed a low-lying conus medullaris. She underwent an L5 laminectomy and cord untethering by sectioning of the filum terminale. After initial improvement of bladder function, her symptoms returned 4 years(More)
Many enterprises are currently exploring the potential cost benefits of running applications in public clouds. Enterprises often have global security policies to ensure that its information management conforms to business rules and legal mandates. The location of data storage and application execution therefore becomes a critical issue. The prevalence of(More)
Computing a user-task assignment for a workflow coming with probabilistic user availability provides a measure of completion rate or resiliency. To a workflow designer this indicates a risk of failure, especially useful for workflows which cannot be changed due to rigid security constraints. Furthermore, resiliency can help outline a mitigation strategy(More)