All Stories

  1. FingerCI
  2. SureSpace
  3. Recovering Mobile Applications based on Backend-as-a-Service from Cyber Attacks
  4. Sensmart
  5. Rectify
  6. DARSHANA: Detecting route hijacking for communication confidentiality
  7. Expressive RFID data access policies for the Pharmaceuticals supply chain
  8. Enforcing RFID data visibility restrictions using XACML security policies
  9. Performance assessment of XACML authorizations for Supply Chain Traceability Web Services
  10. Assessment of visibility restriction mechanisms for RFID data Discovery Services
  11. Cost model for RFID-based traceability information systems
  12. Smart Web Services: Systems’ Integration Using Policy Driven Automatic Configuration
  13. On Describing and Ranking Services based on Non-Functional Properties