Abstract— In several contexts, the success of Workflow applications is limited by the excess of rigidity of workflow enactment, which leaves no freedom to end-users to “custo...
Spatio-temporal databases have been the focus of considerable research activity over a significant period. However, there are as of yet very few prototypes of complete systems, f...
Norman W. Paton, Alvaro A. A. Fernandes, Tony Grif...
– In the past few years considerable demand for user oriented multimedia information systems has developed. These systems must provide a rich set of functionality so that new, co...
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...