As mobile applications become more pervasive, the need for assessing their quality, particularly in terms of efficiency (i.e. performance and resource utilisation), increases. Alt...
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
With orchestrations, one service may be realized through the cooperation of several services. This cooperation has to be formally described. In this paper, we propose to describe ...
Remotely keyed encryption schemes (RKESs), introduced by Blaze 6], support high-bandwidth cryptographic applications (such as encrypted video conferences) in which long-lived secre...
A family of well known problems on graphs includingthe shortest path problem and the data flow analysis problem can be uniformly formulated as a fixed-point problem on graphs. We ...