In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
As data management applications grow more complex, they may need efficient distributed query processing, but also subscription management, data archival etc. To enact such applicat...
Most of the efforts conducted on services nowadays are focusing on aspects related to data and control flow, often disregarding the main goal of the future Internet of services, na...
A given business process may face a large number of regulatory obligations the process may or comply with. Providing tools and techniques through which an evaluation of the complia...
Abstract. We address the challenge of adaptation in open systems. Open systems are characterized by interactions among autonomous and heterogeneous participants. In such systems, e...
Fabiano Dalpiaz, Amit K. Chopra, Paolo Giorgini, J...