Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
In order to achieve better scalability and reduce latency in handling user requests, many Web applications make extensive use of data replication through caches and Content Delive...
Bogdan C. Popescu, Maarten van Steen, Bruno Crispo...
When building enterprise applications that need to be accessed through a variety of client devices, developers usually strive to implement most of the business logic device-indepen...
An increasing number of real-world entities is currently being connected to the Internet and the World Wide Web. We argue that this development is the precursor of a Web of Things...
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...