Abstract This paper addresses the specification of a security policy ontology framework to mediate security policies between virtual organizations (VO) and real organizations (RO)....
This article discusses methods to support assurance of surveillance monitoring; and compliance verification knowledge management (CV-KM). The discussion includes aspects of primar...
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Ad hoc interaction between web services and their clients is a worthwhile but seemingly distant goal. This paper presents guided interaction as an alternative to the current mecha...
Broadband technology has been introduced to the business community and the public as a rapid way of exploiting the Internet. The benefits of its use (fast reliable connections, an...
Abstract Business performance modeling and model-driven business transformation are two research directions that are attracting much attention lately. In this study, we propose an ...
Themis Palpanas, Pawan Chowdhary, George A. Mihail...
The variety of design artifacts (models) produced in a model-driven design process results in an intricate relationship between requirements and the various models. This paper prop...
This paper presents a conceptual framework for service modelling and refinement, called the COSMO (COnceptual Service MOdelling) framework. This framework provides concepts to mode...
Dick A. C. Quartel, Maarten W. A. Steen, Stanislav...