There are a growing number of Information Communication Technology (ICT) applications in cultural heritage. However despite funding constraints, projects often involve similar or ...
Large, global enterprises are increasingly faced with the problem of supporting employees that are on the move. Employees need to share business documents, locate expertise and kn...
Engin Kirda, Harald Gall, Pascal Fenkam, Gerald Re...
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
A model-driven reuse approach that is based on an organization’s Enterprise Architecture (EA) and on the Unified Modeling Language (UML) is proposed. The framework embodying th...
Inter-organizational controls are mechanisms used to ensure and monitor that networked enterprises do not commit a fraud and behave as agreed. Many of such controls have, apart fro...