Web applications have become critical components of the global information infrastructure, and it is important that they be validated to ensure their reliability. Therefore, many ...
Sebastian G. Elbaum, Srikanth Karre, Gregg Rotherm...
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...
: The increasing ubiquity of wireless mobile devices is promoting unprecedented levels of electronic collaboration among devices interoperating to achieve a common goal. Issues rel...
Radu Handorean, Rohan Sen, Gregory Hackmann, Gruia...
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
The Foundation Coalition and others have been working on the development of Concept Inventory (CI) assessment instruments patterned after the well-known Force Concept Inventory...