Sciweavers

68 search results - page 1 / 14
» Model Checking of Security-Sensitive Business Processes
Sort
View
IFIP
2009
Springer
13 years 8 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
IS
2012
12 years 6 months ago
On the refactoring of activity labels in business process models
Large corporations increasingly utilize business process models for documenting and redesigning their operations. The extent of such modeling initiatives with several hundred mode...
Henrik Leopold, Sergey Smirnov 0002, Jan Mendling
BPM
2009
Springer
146views Business» more  BPM 2009»
14 years 5 months ago
Instantaneous Soundness Checking of Industrial Business Process Models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications and o...
Dirk Fahland, Cédric Favre, Barbara Jobstma...
VVEIS
2007
14 years 11 hour ago
Checking Properties of Business Process Models with Logic Programming
Logic programming has been successfully used for reasoning about various kinds of models. However, in the area of business-process modeling it has not yet gained the attention it d...
Volker Gruhn, Ralf Laue
DKE
2011
260views Education» more  DKE 2011»
13 years 2 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...