Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Compliance with privacy legislation is a primary concern for health care institutions that are building information systems support for their business processes. This paper descri...
Change and evolution of business and technology imply change and evolution of development processes. Besides that for a certain enterprise and/or project we will usually integrate ...
Michael Gnatz, Frank Marschall, Gerhard Popp, Andr...
Transformational approaches to generating design and implementation models from requirements can bring effectiveness and quality to software development. In this paper we present a...
Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcar...