Abstract. Enterprise architecture (EA) management forms a commonly accepted means to enhance the alignment of business and IT, and to support the managed evolution of the enterpris...
Sabine Buckl, Florian Matthes, Christian M. Schwed...
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
: Intermodality has been a hot topic in the logistics sector for several decades, but the expected diffusion into business is still limited. The key to increased intermodalism lies...
RFID technology is, according to both industry and academia, one of the most promising new technologies for improving logistics and manufacturing excellence this decade. This resea...
Collaboration, either inter or intra-organization is a critical business function that demands skills and knowledge spanning a wide range of domains including social, business and ...
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
We present a platform that allows a protocol researcher to specify the sequence of games from an initial protocol to a protocol where the security property under consideration can ...
Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...