Whereas previous studies have been primarily focused on the structural features of Information Technology governance, this paper describes an exploratory study of IT governance pr...
Pieter M. A. Ribbers, Ryan Peterson, Marylin M. Pa...
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
An approach to fuse multiple images based on Dempster-Shafer evidential reasoning is proposed in this article. Dempster-Shafer theory provides a complete framework for combining w...
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
This paper discusses the functional and technological opportunities associated with mobile recommendation systems. These are systems that help a mobile user or a group of mobile u...
Hans van der Heijden, Gabriele Kotsis, Reinhard Kr...