Sciweavers

915 search results - page 29 / 183
» Security in Business Process Engineering
Sort
View
AC
2003
Springer
13 years 11 months ago
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Abstract. Over the last decade there has been a shift from "data-aware" information systems to "process-aware" information systems. To support business processe...
Wil M. P. van der Aalst
FASE
2008
Springer
13 years 9 months ago
Correctness-Preserving Configuration of Business Process Models
Abstract. Reference process models capture recurrent business operations in a given domain such as procurement or logistics. These models are intended to be configured to fit the r...
Wil M. P. van der Aalst, Marlon Dumas, Florian Got...
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
13 years 12 months ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
SOCO
2010
Springer
13 years 6 months ago
Visualizing and Assessing a Compositional Approach of Business Process Design
Abstract. In the context of Services Oriented Architecture (Soa), complex systems are realized through the design of business–driven processes. Since the design of a complete pro...
Sébastien Mosser, Alexandre Bergel, Mireill...
DBSEC
2006
107views Database» more  DBSEC 2006»
13 years 9 months ago
From Business Process Choreography to Authorization Policies
Abstract. A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in orde...
Philip Robinson, Florian Kerschbaum, Andreas Schaa...