In this paper, we survey three generation of reflective middleware research carried out at Lancaster University, present experiences gained from this research, and highlight a num...
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
We present novel intelligent tools for mining 3D medical images. We focus on detecting discriminative Regions of Interest (ROIs) and mining associations between their spatial distr...
The integrated approach is a classifier established on statistical estimator and artificial neural network. This consists of preliminary data whitening transformation which provide...
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...