Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Capturing the technical knowledge, contextual information, and rationale surrounding the design decisions underpinning system architectures can greatly improve the software develo...
Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
With the growth of interest on the web services, people pay increasingly attention to the choreography, that is, to describe collaborations of participants in accomplishing a comm...
Zongyan Qiu, Xiangpeng Zhao, Chao Cai, Hongli Yang