Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Workflow technology has emerged as an appropriate platform for consolidating the distributed information resources of an enterprise, promoting interoperability across cross-platfo...
The alignment between business processes and software is inadequately supported in conceptual modelling, although business processes are often the starting point for software devel...
Abstract. This paper presents a methodology for deriving business process descriptions based on terms in business contract. The aim is to assist process modellers in structuring co...
Zoran Milosevic, Shazia Wasim Sadiq, Maria E. Orlo...
Abstract. An approach is presented to guide the benchmarking of invoice analysis systems, a specific, applied subclass of document analysis systems. The state of the art of benchma...