Security API analysis typically only considers a subset of an API’s functions, with results bounded by the number of function calls. Furthermore, attacks involving partial leakag...
— Distributed software environments are increasingly complex and difficult to manage, as they integrate various legacy software with specific management interfaces. Moreover, t...
Laurent Broto, Daniel Hagimont, Estella Annoni, Be...
The main objective of the Intelligent GRID Scheduling System (ISS) project is to provide a middleware infrastructure allowing a good positioning and scheduling of real life applic...
Ralf Gruber, Vincent Keller, Pierre Kuonen, Marie-...
Information security and privacy in the healthcare sector is an issue of growing importance. The adoption of digital patient records, increased regulation, provider consolidation,...
When a client interacts with an expert, e.g. a doctor, it falls upon the expert to ask questions that steer the process towards fulfilling the client's needs. This is most ef...