Sciweavers

249 search results - page 9 / 50
» Modelling Security Goals in Business Processes
Sort
View
IVS
2006
240views more  IVS 2006»
13 years 7 months ago
Business process impact visualization and anomaly detection
Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes ...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, J&oum...
FASE
2008
Springer
13 years 9 months ago
Engineering Service Oriented Applications: From StPowla Processes to SRML Models
Service Oriented Computing is a paradigm for developing software systems as the composition of a number of services. Services are loosely coupled entities, can be dynamically publi...
Laura Bocchi, Stephen Gorton, Stephan Reiff-Margan...
MOBIS
2008
13 years 9 months ago
Policy-Based Semantic Compliance Checking for Business Process Management
: Compliance management, risk analysis, and auditing are disciplines that are critical for large scale distributed enterprise systems. The way these complex systems are developed a...
Marwane El Kharbili, Sebastian Stein
BPM
2008
Springer
164views Business» more  BPM 2008»
13 years 9 months ago
Analyzing Business Continuity through a Multi-layers Model
Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Cont...
Yudistira Asnar, Paolo Giorgini
WSC
2007
13 years 10 months ago
A supply chain paradigm to model business pprocesses at the Y-12 National Security Complex
The NNSA’s Y-12 National Security Complex is a manufacturing facility operated by BWXT Y-12. Y-12’s missions include ensuring the US’ nuclear weapons deterrent, storing nucl...
Reid L. Kress, Jack Dixon, Thomas M. Insalaco, Ric...