Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Finding intensional encapsulations of database subsets is the inverse of query evaluation. Whereas query evaluation transforms an intensional expression (the query) to its extensi...
This paper describes a logical extension to Microsoft Business Framework (MBF) called Analytical View (AV). AV consists of three components: Model Service for design time, Busines...
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...