Sciweavers

240 search results - page 9 / 48
» Privacy and Utility in Business Processes
Sort
View
IS
2012
12 years 6 months ago
On the refactoring of activity labels in business process models
Large corporations increasingly utilize business process models for documenting and redesigning their operations. The extent of such modeling initiatives with several hundred mode...
Henrik Leopold, Sergey Smirnov 0002, Jan Mendling
BPM
2006
Springer
135views Business» more  BPM 2006»
14 years 2 months ago
Managing Process Variants as an Information Resource
Many business solutions provide best practice process templates, both generic as well as for specific industry sectors. However, it is often the variance from template solutions th...
Ruopeng Lu, Shazia Wasim Sadiq
IEEESCC
2007
IEEE
14 years 5 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
COMPSAC
2002
IEEE
14 years 3 months ago
Towards a Software Architecture for Distributed and Mobile Collaborative Systems
Current trends in collaborative business emphasize the importance of business process support within and between organizations. These process participants are increasingly distrib...
Schahram Dustdar, Harald Gall
CCS
2006
ACM
14 years 2 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...