Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Two beliefs, ease of use and usefulness, have been considered to be fundamental in determining the acceptance of various IS in the past decades. These beliefs may not, however, fu...