Efficient hypercube algorithms are developed for the following image transformations: shrinking, expanding, translation, rotation, and scaling. A 2k −step shrinking and expandi...
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
Abstract. This paper focuses on how to model and build composite web services from already existing services. We build on the experience in workflow modeling and see if the princip...
We tackle the problem of providing rigorous formal foundations to current software engineering technologies for web services. We focus on two of the most used XML-based languages f...
Alessandro Lapadula, Rosario Pugliese, Francesco T...