Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
The trends and recent changes in logistics lead to complex and partially conflicting requirements on logistic planning and control systems. Due to the lack of efficiency of curren...
Hagen Langer, Jan D. Gehrke, Joachim Hammer, Marti...
I present analysis examining some of the causes of poor connectivity in developing countries. Based on a technoeconomic analysis and design, I show that technical limitations per ...
Software systems have become more complex, with myriad features and multiple functionalities. A major challenge in developing and maintaining such complex software is to identify ...