Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
— The trend in Grid computing towards more data intensive applications, accessing more and more relational databases and requiring advanced integration of secondhand and publicly...
The main barriers to the level of electronic data interchange required to seamlessly integrate services offered by legacy systems in an Internet environment are the need for appli...
G. M. Bryan, Joanne M. Curry, Carolyn McGregor, D....
As the personal computer becomes a more integral part of the faculty member’s job, the increasing level of day-to-day computer support - often without increases in full-time sta...
: In ubiquitous application scenarios, the information (processing) needs of nomadic users often cannot be satisfied by a set of pre-installed processes like in common workflow sys...
Klaus Haller, Michelle Ackermann, Claudio Munari, ...