Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Data is often encumbered by restrictions on the ways in which it may be used. These restrictions on usage may be determined by statute, by contract, by custom, or by common decenc...
Chris Hanson, Tim Berners-Lee, Lalana Kagal, Geral...
Prepaid customers in mobile telecommunications are not bound by a contract and can therefore change operators (‘churn’) at their convenience and without notification. This make...
Dejan Radosavljevik, Peter van der Putten, Kim Kyl...
A variety of business interactions in open environments can be captured in terms of creation and manipulation of social commitments among the agents. Such interactions include B2B ...
Trust is a sine qua non for trade. According to transaction cost economics, a contract always offers some opportunity to defect. In the case of asymmetric product information, wher...
Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaa...