When software systems incorporate existing software components, there is a need to evaluate these components. Component evaluation is of two kinds according to literature: compone...
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Web services are open, interoperable, easy to integrate and reuse, and are extensively used in many application domains. Research and best practices have produced excellent support...
Leen Lambers, Leonardo Mariani, Hartmut Ehrig, Mau...
Abstract. As systems become more service oriented and processes increasingly cross organizational boundaries, interaction becomes more important. New technologies support the devel...
Wil M. P. van der Aalst, Arjan J. Mooij, Christian...
The vast majority of IT systems are implemented using a traditional procedural paradigm approach using a suitable procedural language such as COBOL. However, with recent developme...