In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application ...
Jeannie R. Albrecht, Ryan Braud, Darren Dao, Nikol...
Cloud computing systems are becoming an important platform for science applications. Infrastructure as a Service (IaaS) clouds provide the capability to provision virtual machines...
In E-commerce processes, various rules and constraints regarding product specifications, pricing, terms and conditions are exchanged between vendors and buyers. Developing a forma...
Mizuho Iwaihara, Masayuki Kozawa, Jun Narazaki, Ya...
A case study of performance and dependability evaluation of fault-tolerant multiprocessors is presented. Two specific architectures are analyzed taking into account system functio...