If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
This paper describes a process for the semi-automatic conversion of numerical and scientific routines written in the C programming language into Triana-based computational servic...
Yan Huang, Ian Taylor, David W. Walker, Robert Dav...
Vocal systems are a well-established reality. Examples of popular voice-based applications include helpdesk services, reservation systems, and vocal mailboxes. These services, tha...
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Panda is middleware designed to bring the benefits of active networks to applications not written with active networks in mind. This paper describes the architecture and implement...
Vincent Ferreria, Alexey Rudenko, Kevin Eustice, R...