We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...
The Linux cluster considered in this paper, formed from shuttle box XPC nodes with 2 GHz Athlon processors connected by dual Gb Ethernet switches, is relatively easily constructed...
David J. Johnston, Martin Fleury, Michael Lincoln,...
CORBA (Common Object Request Broker Architecture) is widely perceived as an emerging platform for distributed systems development. In this paper, we discuss CORBA's testing, ...
Most software development errors are caused by incorrect or ambiguous requirement specifications gathered during the requirement elicitation and analysis phase. For the past decad...
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...