A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Model-based approaches can be useful when designing nomadic applications, which can be accessed through multiple interaction s. Various models and levels of abstraction can be con...
We describe MASTERMIND, a step toward our vision of a knowledge-based design-time and run-time environment where human-computer interfaces development is centered around an all-en...
Robert Neches, James D. Foley, Pedro A. Szekely, P...
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Cooperative knowledge spaces create new potentials for the experimental fields in natural sciences and engineering because they enhance the accessibility of experimental setups th...
Sabine Cikic, Sabina Jeschke, Thomas Richter, Uwe ...