Udo Bleimann

Learn More
The paper considers the requirement for information security within the domain of online distance learning. A generic module structure is presented which represents a high level abstraction of the different stages of the educational process. This leads into a discussion of the main security issues that must be considered at each stage. These various(More)
This paper presents an approach to security policy enforcement with collaborative business processes defined using BPEL and deployed across enterprise domain boundaries for execution. The assessment of compliance with security policies at the location where a BPEL script is to be executed is facilitated by re-formulating the security policies with respect(More)
This paper proposes a hybrid approach for managing knowledge within companies based on communication between people. In addition to traditional Knowledge Management Systems our concept supports employees not only in finding information but also in establishing contact between the person requesting information and a person or community that can help solve(More)
Today's standardised approaches for the control of QoS (Quality of Service) in NGN (Next Generation Networks) come along with a high volume of additional, unscalable traffic for the allocation and reservation of network resources within the IP transport network. This paper describes a new framework for comprehensive QoS control in SIP-based (Session(More)
The growing complexities of software and the demand for shorter time to market are two important challenges that face today's IT industry. These challenges demand the increase of both productivity and quality of software. Model-based testing is a promising technique for meeting these challenges. Traceability modeling is a key issue and challenge in(More)
Current personal knowledge and information management tools encounter many problems within the area of knowledge fragmentation, as well as within the knowledge of the knowledge formation process. The chosen approach to overcome these problems is an intelligent, independent intermediate layer. This layer needs to remember and trace the different steps our(More)