In this article, we address the problem of modularizing legacy applications with monolithic structure, primarily focusing on business software written in an objectoriented program...
Abstract. Mobile payment normally occurs as a wireless transaction of monetary value and includes the initiation, authorization and the realization of the payment. Such transaction...
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Information and Communication Technologies (ICTs) are rapidly changing and new technologies, processes, and skills are constantly emerging. An important challenge for the research...
A service-oriented architecture (SOA) promises a more flexible intra- and interorganizational integration of heterogeneous application systems. The central design element of a SOA...