Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
A concern relevant to the viability of a Knowledge Management System (KMS) implementation may well be: at what point is there adequate information packets and links among them to ...
Considered as enablers of seamless application-toapplication integration both within company boundaries and on a global scale, Web Services-based SOAs have traditionally focused o...
Service-based distributed computing as a mode of resource sharing is receiving increased attention, motivated both by enterprise applications and by standardization efforts in the...
Dawid Kurzyniec, Tomasz Wrzosek, Vaidy S. Sunderam
The Vienna Component Framework (VCF) supports the interoperability and composability of components across different component models, a facility that is lacking in existing compon...
Johann Oberleitner, Thomas Gschwind, Mehdi Jazayer...