Abstract—Plugin-based application design has become increasingly popular in recent years, and has contributed to the success of a range of very different applications including ...
At the heart of a well-disciplined, systematic methodology that explicitly supports the use of COTS components is a clearly defined process for effectively using components that m...
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
In this paper we discuss that software processes for the development of electronic commerce systems are different from software processes for other kinds of information systems. We...