This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Recently, Helmert and Geffner proposed the context-enhanced additive heuristic, where fact costs are evaluated relative to context states that arise from achieving first a pivot c...
Integrity constraints (ICs) play a key role in the definition of conceptual schemas. In the UML, ICs are usually specified as invariants written in the OCL. However, due to the hi...
In complex systems, it is difficult to identify which system element is involved in which requirement. In this article, we present a new approach for expressing and validating a ...
While WS-BPEL is emerging as the prominent language for modeling executable business processes, it provides limited support for designing flexible processes. An important need of ...