Modern object-relational database systems are capable of managing multimedia data, e.g. image, video and audio. In this paper we study how such universal database systems can be u...
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
: We aim at elaborating a decision support system to manage concrete experience, using Artificial Intelligence methods, such as Case-Based Reasoning. We target any organization tha...
The aim of Participatory Design (PD) is to involve the users in the design. Even though the research has shown the success of PD projects in empowering users, little has been said...
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...