Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
E-science experiments typically involve many distributed services maintained by different organisations. After an experiment has been executed, it is useful for a scientist to ver...
Sylvia C. Wong, Simon Miles, Weijian Fang, Paul T....
Autonomic computer systems aim to reduce the configuration, operational, and maintenance costs of distributed applications by enabling them to self-manage, self-heal, self-optimiz...
Jules White, Douglas C. Schmidt, Aniruddha S. Gokh...
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Software publishers and information service providers publish information about their own products and about other products and people. Additional content might be incidental, suc...