Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
High-interaction honeypots are relevant to provide rich and useful information obtained from attackers. Honeypots come in different flavors with respect to their interaction pote...
This paper briefly shows how product designers as well as information system designers may use the habitat framework as a tool to inform their understanding of the pervasive compu...
Setting up a simulation model is more than writing down state equations and running them on a computer. A lot of conceptual information about the physics and engineering aspects o...
Arno Breunese, Jan L. Top, Jan F. Broenink, J. M. ...
This paper is an attempt to develop a unifying algebraic framework for extensional theories capturing formally the informal concept of extensionality, as well as a generic automate...