: As more third-party software components are available in the commercial market, more people begin to use the component-based software engineering approach to developing component...
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
When developing systems based on COTS, components need to be adapted in most of the occasions to work under certain conditions which were not initially predicted by their develope...
Extreme Programming (XP) is an agile (lightweight) software development methodology and it becomes more and more popular. XP proposes many interesting practices, but it also has s...
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...