— An enterprise architecture is intended to be a comprehensive blueprint describing the key components and relationships for an enterprise from strategies to business processes t...
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
MAD (Movie Authoring and Design) is a novel design and authoring system that facilitates the process of creating dynamic visual presentations such as motion pictures and lecture-d...
Ronald Baecker, Alan J. Rosenthal, Naomi Friedland...