Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
There is an increased interest in using control charts for monitoring and improving software processes, particularly quality control processes like reviews and testing. In a contro...
Navigating through new voicemail messages to find messages of interest is a time-consuming task, particularly for high-volume users. When checking messages under a time constraint...
The most apparent proof of changes in the public sector because of modern information and communication technologies are electronic services like general onlineinformation procure...
XML has emerged as the standard data exchange format for Internet-based business applications. This has created the need to publish existing business data, stored in relational da...
Jayavel Shanmugasundaram, Jerry Kiernan, Eugene J....