We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust rela...
Protocols to facilitate secure electronic delivery are necessary if the Internet is to achieve its true potential as a business communications tool. We present a protocol for secu...
Today's business climate requires to constantly evolve IT strategies for responding to new opportunities or threats. While the fundamentals of IT -- reliability, availability,...