Sciweavers

68 search results - page 5 / 14
» Model Checking of Security-Sensitive Business Processes
Sort
View
EDOC
2006
IEEE
14 years 2 months ago
Structural Patterns for Soundness of Business Process Models
The correctness of business process models is of paramount importance for the application on an enterprise level. A severe problem is that several languages for business process m...
Boudewijn F. van Dongen, Jan Mendling, Wil M. P. v...
JSSPP
2005
Springer
14 years 2 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
BPM
2011
Springer
295views Business» more  BPM 2011»
12 years 8 months ago
Compliance by Design for Artifact-Centric Business Processes
Compliance to legal regulations, internal policies, or best practices is becoming a more and more important aspect in business processes management. Compliance requirements are usu...
Niels Lohmann
SOCA
2007
IEEE
14 years 2 months ago
Static Analysis of Business Artifact-centric Operational Models
Business Artifacts are the core entities used by businesses to record information pertinent to their operations. Business operational models are representations of the processing ...
Cagdas E. Gerede, Kamal Bhattacharya, Jianwen Su
MKWI
2008
151views Business» more  MKWI 2008»
13 years 10 months ago
Towards A Formal Framework for Business Process Compliance
: The advent of regulatory compliance requirements such as Sarbanes Oxley Act has forced enterprises to set up a process for managing an effective internal controls system on busin...
Kioumars Namiri, Nenad Stojanovic