Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
In this paper I argue that we do not understand the process of default reasoning. A number of examples are given which serve to distinguish di erent default reasoning systems. It ...
Distributed computing systems are becoming bigger and more complex. While the complexity of large-scale distributed systems has been acknowledged to be an important challenge, the...
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Though in most data warehousing applications no relevance is given to the time when events are recorded, some domains call for a different behavior. In particular, whenever late re...