Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
Abstract. The challenge of building consistent, available, and scalable data management systems capable of serving petabytes of data for millions of users has confronted the data m...
Divyakant Agrawal, Amr El Abbadi, Shyam Antony, Su...
Today, more and more enterprises process XML data, many of them already in XML database systems. Once systems start to grow in size, scalability becomes an issue. One of the core o...
Business–driven IT management (BDIM) offers a promising approach to managing enterprise IT infrastructure and services efficiently and to improving business results at the same ...
Enterprise Architecture (EA) requires modeling enterprises across multiple levels (from markets down to IT systems). Providing tool support for such models is a challenge (e.g. mo...