Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
We study a security property for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. The security property that we propose in this paper, named Per...
Control intensive scalar programs pose a very different challenge to highly pipelined supercomputers than vectorizable numeric applications. Function call/return and branch instru...
Abstract. Requirements engineering is still an area of software engineering in which theory and practice greatly differ. This work presents the results of an empirical study of ar...
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...