IS Architecture emerges as a result of a sequence of IS project implementations. The architecture that emerges can be viewed as a network of software components linked by their in...
To save energy, many power management policies rely on issuing mode-change commands to the components of the system. Efforts to date have focused on how these policies interact wi...
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
This paper presents a security characterisation process framework for software components and their compositions in order to address the issue of trust in component based software...
Increasingly, applications are being built by combining existing software components. For the most part, a software developer can treat components as black-boxes. However, for som...
Andrew Chan, Reid Holmes, Gail C. Murphy, Annie T....