UN/CEFACT’s Modelling Methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific co...
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
This paper presents the mechanisms proposed by a generic cognitive architecture for virtual characters with emotional influenced behaviors, called cognitiva, to maintain behavior ...
This work-in-progress report subsumes our ongoing research to develop a Topic Maps centric, modularised system which supports collaborative software development by combining the me...
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...