Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
A lot of attention has been given to network quality of service and efforts to make layers on top of the network also QoS-aware increase noticeably. This paper explores QoS-aware s...
Ing Widya, R. E. Stap, L. J. Teunissen, B. Frank H...
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
Towards a sustainable society, design of artifacts must be optimized with limited resources on the earth while keeping our life. In order to realize it, I emphasize openness of des...
Abstract. Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a gene...