In this paper we present a new infrastructure for building distributed applications that communicate through remote objects. The objects are available by the use of the Java RMI, e...
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Omniscient debuggers make it possible to navigate backwards in time within a program execution trace, drastically improving the task of debugging complex applications. Still, they...
This paper discusses the lessons learned and decisions made while designing and developing a web-based application for the National Spatial Information Framework (NSIF) of South A...
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...