An event-based solution that uses events to convey information to a monitoring tool is well suited to implementing a non-intrusive monitoring infrastructure. This enables an SOA s...
The tendency of acquiring information systems and other high technology services from international suppliers continues at unprecedented levels. The primary motivation for the off...
Although extensive literature on BPR is available, there is still a lack of concrete guidance on actually changing processes for the better. In this paper we propose and detail out...
Mariska Netjes, Selma Limam Mansar, Hajo A. Reijer...
The role of ontologies in knowledge base systems is gradually increasing. Along with the growth of Internet based applications and ecommerce, the need for easy interoperability bet...
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...