Sciweavers

2624 search results - page 413 / 525
» On Business Process Model Transformations
Sort
View
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 8 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
ECIS
2004
15 years 5 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett
ECIS
2004
15 years 5 months ago
Decoupling Application Roles and Technology Generations: A Life-Cycle Approach
Companies invest large amounts of money in new technologies. Not surprisingly, much of the research carried out in relation to IT-investments has focused on the adoption of new te...
Anders Mårtensson, Pablo Valiente
CAISE
2010
Springer
15 years 4 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
AEI
2007
112views more  AEI 2007»
15 years 4 months ago
A p2p based service flow system with advanced ontology-based service profiles
A peer-to-peer (p2p) based service flow management system, SwinDeW-S, could support decentralised Web service composition, deployment and enactment. However, traditional workflow ...
Jun Shen, Yun Yang, Jun Yan