The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
The paper presents an approach for performance and complexity analysis of hardware/software implementations for real-time systems on every stage of the partitioning. There are two...
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Architectural based approaches to designing software are motivating changes in the way software is developed for safety-critical systems. These new approaches allow developers to d...
Due to rapid development in the global market, workflow systems are not limited to a single country. Electronic business like workflows span across countries and hence there arise...