Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, ha...
A number of design models have been proposed in the area of Human-Computer Interaction (HCI) to support user-centered system design. el, abstract task models and detailed interface...
Existing ADLs (Architecture Description Languages) have an advantage of formally specifying the architecture of component-based systems. But ADLs have not come into extensive use ...
In many distributed computing paradigms, especially sensor networks and ubiquitous computing but also grid computing and web services, programmers commonly tie their application to...
Jonathan J. Davies, Alastair R. Beresford, Alan My...