Sciweavers

68 search results - page 7 / 14
» Model Checking of Security-Sensitive Business Processes
Sort
View
ICDT
2009
ACM
248views Database» more  ICDT 2009»
14 years 10 months ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...
ISTA
2003
13 years 11 months ago
EPC Modelling based on Implicit Arc Types
Abstract: Event Driven Process Chains (EPC) are commonly used for the modelling of business processes. As modelling is decentralised to personnel not familiar with the formal aspec...
Jan Mendling, Markus Nüttgens
CAISE
2005
Springer
14 years 3 months ago
A Method and Tool for Business-IT Alignment in Enterprise Architecture
Enterprise architects seek to align enterprise processes and structure with their supporting IT systems so that enterprises can flourish in their environment. The enterprise archi...
Alain Wegmann, Pavel Balabko, Lam-Son Lê, Gi...
ICWE
2005
Springer
14 years 3 months ago
Modelling the Behaviour of Web Applications with ArgoUWE
A methodology needs to be empowered by appropriate tool support. The CASE tool ArgoUWE supports designers in the use of the UWE methodology for the systematic, UML-based developmen...
Alexander Knapp, Nora Koch, Gefei Zhang
CSAC
2006
13 years 11 months ago
Toward a Pi-Calculus Based Verification Tool for Web Services Orchestrations
Abstract. Web services constitute a dynamic field of research about technologies of the Internet. WS-BPEL 2.0, is in the way for becoming a standard for defining Web services orche...
Faisal Abouzaid