The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
: Specifying behavioral specifications for components apart from the conventional syntactic interface specifications can be very useful in component based system development. Preco...
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
In component software, the independence of components is achieved by separating their interfaces from implementations. The interface definition of a component serves as the contr...