Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
With the advent of in-home networking and ubiquitous computing, it becomes apparent that we have an increasing need for automatic adaptation of user interfaces to different device...
Flexibility and interoperability make web services well suited for designing highly-customizable reactive service-based applications, that is interactive applications that can be ...
Leen Lambers, Hartmut Ehrig, Leonardo Mariani, Mau...
—At present, Web services are created and updated on the fly. It has already beyond the human ability to analysis them and generate the composition plan manually. It is a problem...
Many domain specialists are not familiar or comfortable with formal notations and formal tools like theorem provers or model generators. To address this problem we developed Attem...