Abstract. We present a technique and a tool for model-checking operational UML models based on a mapping of object oriented UML models into a framework of communicating extended ti...
Enterprise modeling involves multiple domains of expertise: requirements engineering, business process modeling, IT development etc. Our experience has shown that hierarchical ente...
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Abstract. Current e-business technology enables the execution of increasingly complex coordination processes that link IT services of different companies. Successful design of cros...
Roel Wieringa, Vincent Pijpers, Lianne Bodenstaff,...
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...