Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
Academics, having written their peer reviewed articles, may at some stage in the make their work Open Access (OA). They can do this by self-archiving an electronic version of thei...
act notation, so separating the abstract syntax and semantics of the language constructs from their different concrete notations. Although the foundation constituents of the MDE a...