Many software security policies can be encoded as aspects that identify and guard security-relevant program operations. Bugs in these aspectually-implemented security policies oft...
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
In this paper we introduce WiMo, a location-based social networking tool that enables users to share and store their emotional feelings about places. WiMo creates a mobile social ...
Ruturaj N. Mody, Katharine S. Willis, Roland Kerst...
Abstract. The advancement of network induces great demands on a series of applications such as the multicast routing. This paper firstly makes a brief review on the algorithms in ...
—Autonomic computing is a paradigm that aims at reducing administrative overhead by providing autonomic managers to make applications self-managing. In order to better deal with ...
Ahmad Al-Shishtawy, Vladimir Vlassov, Per Brand, S...