The Java language and platform have been considered by many as natural candidate for creating grid systems. The platform-independent runtime environment, safe and high-level langu...
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
Many techniques exist for analyzing information domains in preparation for systems design. No systematic technique exists, however, for analyzing a system or domain in terms of it...
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
The current set of social networking platforms, e.g. Facebook and MySpace, has created a new class of Internet applications called social software. These systems focus on leveragi...
E. Michael Maximilien, Tyrone Grandison, Kun Liu, ...