Learn More
Software Architectures have evolved considerably over the last decade and, partly also due to the significant progress made in component-based development, have become a major subfield of Software Engineering. The associated field of Architecture Description Languages (ADLs) has also evolved considerably, providing numerous approaches to the formal(More)
Our effort is focused on bridging the gap between software design and implementation of component-based systems using software architectures at the modeling/design level and the coordination paradigm at the implementation level. We base our work on the clear support of both software architectures and event-driven coordination models for Component Based(More)
Web applications are the most universal way to make services and data accessible on the Internet. With the increase in the use of these applications, there has also been an increase in the amount and complexity of vulnerabilities and attacks. These attacks target directly the back-end database systems of the web application to achieve information. In this(More)
Authentication is the process of identifying an individual, usually based on username and password. Authentication merely ensures that the individual is who he or she claims to be. This forestalls the activities against confidentiality and integrity. Shoulder surfing is the main problem of graphical passwords. To overcome the problem of shoulder surfing we(More)
Several techniques have been proposed for information hiding including hiding in slack space, which is the focus of this paper. However, current techniques of hiding in slack space depend on utilizing exiting slack space on the disk, which can be seriously limiting. Also, all techniques proposed thus far for hiding in slack space are impacted by the cluster(More)
  • 1