Companies are operating in a dynamic environment, resulting in a continuous need of adapting used information systems to changing business processes and associated information need...
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
As current Voice-over-IP (VoIP) systems encourage a direct communication between the callees they are similar in design to peerto-peer (P2P) approaches. Therefore, we introduce a f...
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
In ubiquitous computing era, the notion of context-awareness will play an important role. An application should be aware of its operating context for supporting and enriching huma...