All Stories

  1. This paper presents a differential privacy mechanism for mobility trajectories.
  2. Trustworthy scientific computing
  3. Trusted CI Experiences in Cybersecurity and Service to Open Science
  4. A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing
  5. Security in high-performance computing environments
  6. A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid