Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Component-based architectures are the traditional approach cile application specific optimization with reusable abstractions in sensor networks. However, they frequently overwhelm ...
This paper presents DiV ES, a distributed support for the development of networked Distributed Virtual Environments. DiV ES exploits the publish subscribe interaction model to def...
Complex model editing activities are frequently performed to realize various model evolution tasks (e.g., model scalability, weaving aspects into models, and model refactoring). In...
Yu Sun, Jeff Gray, Christoph Wienands, Michael Gol...