Security protocols are crucial to achieve trusted computing. However, designing security protocols is not easy and so security protocols are typically faulty and have to be repaire...
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
A multi-party contract signing (MPCS) protocol is used for a group of signers to sign a digital contract over a network. We analyse the protocols of Mukhamedov and Ryan (MR), and o...
Performance management (PM) is a key function of virtual organization (VO) management. A large set of PM indicators has been proposed and evaluated within the context of virtual br...
While Enterprise Architecture Modeling (EAM) methodologies become more and more popular, an EAM methodology tailored to the needs of virtual organizations (VO) is still to be devel...
A major challenge in effective active ageing support is to identify/design new organizational structures, approaches, and mechanisms so that on one hand older people do not feel ex...
Antonio del Cura, Luis M. Camarinha-Matos, Filipa ...