Skip to main content
    • by 
    •   5  
      Requirements EngineeringRegulatory ComplianceDesign ResearchRegulatory Compliance (Computer Science)
There has been an extensive amount of research conducted internationally over the last four decades in the area of automated and semi-automated regulatory compliance checking for the Architecture, Engineering, and Construction (AEC)... more
    • by 
    •   5  
      Computer ScienceAutomated Reasoning (Computer Science)BIM (Architecture)Regulatory Compliance (Computer Science)
The integration of governance, risk, and compliance (GRC) activities has gained importance over the last years. This paper presents an analysis of the GRC integration efforts in information technology departments of three large... more
    • by 
    •   3  
      Regulatory ComplianceRegulatory Compliance (Computer Science)Design Science research
In this background paper, I identify issues for the expert meeting ‘Food safety: science and ethics’ of the FAO/WHO in Rome 3-5 september 2002
    • by 
    •   4  
      Food SafetyRegulatory Compliance (Computer Science)Food ethicsFAO
There has been an extensive amount of research conducted internationally over the last four decades in the area of automated and semi-automated regulatory compliance checking for the Architecture, Engineering, and Construction (AEC)... more
    • by 
    •   5  
      Computer ScienceAutomated Reasoning (Computer Science)BIM (Architecture)Regulatory Compliance (Computer Science)
The security of monitoring systems is critical for maintaining an accurate view of the state of infrastructure systems such as enterprise networks and critical infrastructure systems. A malicious user that controls a monitoring system has... more
    • by 
    •   6  
      Computer ScienceNetwork SecurityRegulatory Compliance (Computer Science)Monitoring and Risk Managment
Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a... more
    • by 
    •   13  
      Information SecurityNetwork SecurityRegulatory Compliance (Computer Science)Monitoring and Risk Managment
There has been an extensive amount of research conducted internationally over the last four decades in the area of automated and semi-automated regulatory compliance checking for the Architecture, Engineering, and Construction (AEC)... more
    • by 
    •   5  
      Computer ScienceAutomated Reasoning (Computer Science)BIM (Architecture)Regulatory Compliance (Computer Science)
    • by 
    •   6  
      Requirements EngineeringRegulatory ComplianceDesign ResearchRegulatory Compliance (Computer Science)