User’s privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model wh...
We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust rela...
This paper describes a core component of Mobius' Trusted Code Base, the Mobius base logic. This program logic facilitates the transmission of certificates that are generated u...
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...