This paper presents a graph matching model for the software architecture recovery problem. Because of their expressiveness, the graphs have been widely used for representing both ...
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
Access control is one of the most important issue with ubiquitous networking environment. Traditional access control methods are mainly considering authentication of registered us...
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
In its current state, VRML does not provide support for interaction and on-line access to databases, even though these are two fundamental issues for business applications. We hav...