Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
In this paper we describe AutAT, an open source Eclipse plugin to better enable test driven development of web applications. AutAT lets non-technical people write acceptance tests...
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, ...