Sciweavers

21 search results - page 4 / 5
» Compliance by Design for Artifact-Centric Business Processes
Sort
View
OTM
2010
Springer
13 years 9 months ago
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
In this paper, we present generic algorithms to ensure the consistency of mutual-exclusion and binding constraints in a business process context. We repeatedly identified the need...
Mark Strembeck, Jan Mendling
CSFW
2007
IEEE
14 years 5 months ago
Privacy and Utility in Business Processes
se an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy ...
Adam Barth, John C. Mitchell, Anupam Datta, Sharad...
RE
2008
Springer
13 years 10 months ago
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility
U.S. laws and regulations are designed to support broad societal goals, such as accessibility, privacy and safety. To demonstrate that a product complies with these goals, busines...
Travis D. Breaux, Annie I. Antón, Kent Bouc...
TRUSTBUS
2009
Springer
14 years 5 months ago
A Formalization of HIPAA for a Medical Messaging System
Abstract. The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance syste...
Peifung E. Lam, John C. Mitchell, Sharada Sundaram
SACMAT
2011
ACM
13 years 1 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...