The increasingly constrained power budget of today's microprocessor has resulted in a situation where power savings of all components in a system have to be taken into consid...
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
Abstract. Workflows represent the coordination requirements of various distributed operations in an organisation; workflows neatly capture business processes, and are particularly ...
Joey Sik Chun Lam, Frank Guerin, Wamberto Weber Va...
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
An e-contract is a contract modeled, specified, executed, controlled and monitored by a software system. Econtract evolves over a period of time and there are many scenarios of ch...