Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
The use of scenarios has become a popular technique for requirements elicitation and specification building. Since scenarios capture only partial descriptions of system behavior, ...
UN/CEFACT’s Modeling Methodology (UMM) has been developed to analyze and design B2B business processes independent of the underlying exchange technology. It became the methodolog...