Middleware enables distributed components to interact with each others in diverse and complex manners. Such interactions should be modeled at architecture level for controlling th...
Business-IT alignment can be achieved at various levels of maturity. Supposing that an organization has tried to achieve business-IT alignment, a question to face is: how is that o...
—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Numerous approaches to information modeling exist within chemical engineering representing product data, work processes, or other information. These models have a limited scope an...