This paper illustrates a technique for specifying the detailed timing, logical operation, and compositional circuit design of digital circuits in terms of ordinary state machines w...
This paper considers a tree-rewriting framework for modeling documents evolving through service calls. We focus on the automatic verification of properties of documents that may c...
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
: This study represents a survey approach in order to analyse the information society in a regional setting. The first part deals with a current problematic issue: the human resour...
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...