In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
The Cage is an easy to use 3D grid. Built into a 3D modeler, it provides a visualized reference coordinate system that helps the user to orient himself in 3D space, and that suppo...
Conceptual models serve as abstractions of user’s perceptions of a system. The choice and detailing of these abstractions are key to model use and understanding for analyst and ...
Durk-Jouke van der Zee, Jack G. A. J. van der Vors...