Successful implementation of information technology (IT)-enabled strategy rests on the performance of IT professionals. Consequently, the development and retention of this "I...
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
There is a clear intuitive connection between the notion of leakage of information in a program and concepts from information theory. This intuition has not been satisfactorily pi...
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...