Current database management system technology is unable to provide adequate support for Nomadic Computing. Mobile applications require systems which are sufficiently lightweight an...
Requirements models are essential not just during system implementation, but also to manage system changes post-implementation. Such models should be supported by a requirements m...
Neil A. Ernst, John Mylopoulos, Yijun Yu, Tien Ngu...
Coordination of development activities is often the most crucial success factor in a software development team. Typically, teams rely on configuration management (CM) systems for...
Roger M. Ripley, Ryan Y. Yasui, Anita Sarma, Andr&...
In this paper we address the issue of automating systems management. Currently, any changes made in the configuration settings of the IT infrastructure in an enterprise are perfor...
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...