Applying Cloud computing techniques for analyzing large data sets has shown promise in many data-driven scientific applications. Our approach presented here is to use Cloud comput...
Kalpa Gunaratna, Paul Anderson, Ajith Ranabahu, Am...
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Abstract. The agent-oriented software engineering methodology Tropos offers a structured development process and supporting tools for developing complex, distributed systems. The ...
Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alber...
Understanding function signature change properties and evolution patterns is important for researchers concerned with alleviating signature change impacts, understanding software ...