Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Abstract. Communicating Sequential Processes (CSP) was developed around a formal algebra of processes and a semantics based on traces (and failures and divergences). A trace is a r...
This paper presents a generic model driven approach to enable Quality of Service (QoS) modeling and realization for component based middleware platforms. We describe a QoS metamod...
IT governance is one of these concepts that suddenly emerged and became an important issue in the information technology area. Some organisations started with the implementation o...
Paxos is a well known algorithm for achieving consensus in distributed environments with uncertain processing and communication timing. Implementations of its variants have been s...
Chryssis Georgiou, Procopis Hadjiprocopiou, Peter ...