Sciweavers

915 search results - page 28 / 183
» Security in Business Process Engineering
Sort
View
BPM
2009
Springer
134views Business» more  BPM 2009»
14 years 2 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
BPM
2005
Springer
141views Business» more  BPM 2005»
14 years 1 months ago
Towards a Framework for the Agile Mining of Business Processes
Abstract. In order to support business processes effectively, their implementation by a process management systems (PMS) must be as close to the real world’s processes as possib...
Barbara Weber, Manfred Reichert, Stefanie Rinderle...
IEEEARES
2006
IEEE
14 years 1 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
FASE
2005
Springer
14 years 1 months ago
Analyzing Web Service Based Business Processes
This paper is concerned with the application of Web services to distributed, cross-organizational business processes. In this scenario, it is crucial to answer the following questi...
Axel Martens
GI
2005
Springer
14 years 1 months ago
Programming in the Large based on the Business Process Modelling Notation
: A software application is related to the processes it supports. Today, UML diagrams esp. use case diagrams and activity diagrams are often used to model the relevant aspects of t...
Christian Emig, Christof Momm, Jochen Weisser, Seb...