Connectors are used to realize component interactions in component systems. Apart from their primary function, which is mediating the communication, their implementation can also s...
In this paper, we present a pattern-based software development method that preserves usability and security quality characteristics using a role-driven mapping of requirements anal...
Abstract. Object models capture key properties of object-oriented architectures, and they can highlight relationships between types, occurrences of sharing, and object encapsulatio...
Time plays an important role in our everyday's life. For a lot of observations we make and actions we perform, temporal information is relevant. The importance of time is refl...
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...