We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
This paper introduced coding guidelines for use by academics developing code as part of their research in areas of computer science or similar disciplines. We introduce the guidel...
: The development of Customer Relationship Management (CRM) capabilities by incrementally sourcing and combining “best of breed” services from different providers is a key leve...
A commonly used strategy to address the scalability challenge in object-oriented reverse engineering is to synthesize coarse-grained representations, such as package diagrams. How...
Designing cross-organizational e-business applications faces the problem that the collaborating businesses must align their commercial interests without any central decision makin...