Sciweavers

975 search results - page 52 / 195
» Applying Patterns during Business Process Modeling
Sort
View
ACMICEC
2005
ACM
156views ECommerce» more  ACMICEC 2005»
14 years 3 months ago
Establishing and maintaining compatibility in service oriented business collaboration
Current composite web service development and management solutions, e.g. BPEL, do not cater for assessing and maintaining comparability of business partners during business collab...
Bart Orriëns, Jian Yang
BPM
2010
Springer
147views Business» more  BPM 2010»
13 years 8 months ago
From People to Services to UI: Distributed Orchestration of User Interfaces
Traditionally, workflow management systems aim at alleviating people's burden of coordinating repetitive business procedures, i.e., they coordinate people. Web service orchest...
Florian Daniel, Stefano Soi, Stefano Tranquillini,...
CAISE
2004
Springer
14 years 3 months ago
Office Activity Procedure Exception Handling Realization Difficulties
Office activity procedure automation is getting very popular in major organizations. During the automation then workflow method is chosen frequently, because of its possibility to ...
Dovile Vojevodina, Genadijus Kulvietis
SACMAT
2009
ACM
14 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
QSIC
2007
IEEE
14 years 4 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao