We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
Debugging distributed applications is a wellknown challenge within the realm of Computer Science. Common problems faced by developers include: lack of an observable global state, ...
This paper explores the application of Base Object Models (BOMs), an emerging XML standard, for rapidly composing simulations and simulation environments. We examine how pattern c...
: The development of Customer Relationship Management (CRM) capabilities by incrementally sourcing and combining “best of breed” services from different providers is a key leve...