Until practical ad-hoc localization systems are developed, early deployments of wireless sensor networks will manually configure location information in network nodes in order to...
A complete workflow specification requires careful integration of many different process characteristics. Decisions must be made as to the definitions of individual activities, th...
Shazia W. Sadiq, Maria E. Orlowska, Wasim Sadiq, C...
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
This paper gives an overview of the ArchWare European Project1 . The broad scope of ArchWare is to respond to the ever-present demand for software systems that are capable of accom...