When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
While Enterprise Architecture Modeling (EAM) methodologies become more and more popular, an EAM methodology tailored to the needs of virtual organizations (VO) is still to be devel...
Abstract. Enterprise architecture (EA) management forms a commonly accepted means to enhance the alignment of business and IT, and to support the managed evolution of the enterpris...
Sabine Buckl, Florian Matthes, Christian M. Schwed...
Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...
A number of selected field-study techniques have been validated in a case study in the domain of railway signal boxes. The context of this work is the endeavour of a human-centred ...
Joke Van Kerckhoven, Sabine Geldof, Bart Vermeersc...