—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Aspects are behaviours that are tangled and scattered across a system. In requirements documentation, aspects manifest themselves as descriptions of behaviours that are intertwine...
Multilevel transactions have been proposed for multilevel secure databases; in contrast to most proposals, such transactions allow users to read and write across multiple security...
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...
—A new approach to perform feasibility studies using business process models is proposed. The utilization of the improved Role Activity Diagram notations has led to the extractio...