Although the business process community has put a major emphasis on patterns, notably the famous workflow patterns, only limited support for using patterns in today's business...
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
The NNSA’s Y-12 National Security Complex is a manufacturing facility operated by BWXT Y-12. Y-12’s missions include ensuring the US’ nuclear weapons deterrent, storing nucl...
Reid L. Kress, Jack Dixon, Thomas M. Insalaco, Ric...
While exploring value webs -cooperating enterprises- it is common to view such webs from multiple perspectives: (1) the business value perspective, (2) the business process perspe...
: Integrated process support is highly desirable in environments where data related to a particular (business) process are scattered over distributed, heterogeneous information sys...