Virtual Private Networks (VPN) represent, in today’s Internet, one of the most interesting applications. This is due both to their usefulness in corporate network scenarios and ...
R. Maresca, Maurizio D'Arienzo, Marcello Esposito,...
For enterprise-wide and cross-enterprise workflow (WF) applications, the load of the WF servers and the amount of communication in the subnets may become a bottleneck. This paper s...
Communication between agents needs to be flexible enough to encompass together a variety of different aspects such as, conformance to society protocols, private tactics of the indi...
A method for recognizing design patterns from C++ programs is presented. The method consists of two separate phases, analysis and reverse engineering of the C++ code, and architec...
Inter-organizational cooperation has specific requirements for access control. The paper presents the results from a field study which looks at the cooperation between two enginee...