In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Business process modeling is an important phase during requirements collection. Usually functional, dynamic and role models are needed. We propose to integrate Role Activity Diagr...
Costin Badica, Maria Teodorescu, Cosmin Spahiu, Am...