Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to sec...
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
We perform knowledge discovery in software archives in order to detect refactorings on the level of classes and methods. Our REFVIS prototype finds these refactorings in CVS repo...
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...