Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involv...
Abstract. The agent-oriented software engineering methodology Tropos offers a structured development process and supporting tools for developing complex, distributed systems. The ...
Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alber...
In this paper we present a new modeling technique using software engineering tool Flow Model for modeling and solving the Dynamic Power Management (DPM) with complex behavioral cha...
Jiangwei Huang, Tianzhou Chen, Minjiao Ye, Yi Lian
We present a logical framework for representing the agents in two different cooperating information systems. We define an architecture for Integrated Supply Chain Management in wh...