Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
This paper considers a coalition C of enterprises {E1,..., En}, which is to be governed by a coalition policy PC , and where each memberenterprise Ei has its own internal policy Pi...
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...