Sciweavers

915 search results - page 31 / 183
» Security in Business Process Engineering
Sort
View
BPM
2003
Springer
102views Business» more  BPM 2003»
14 years 27 days ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
ROOM
2000
13 years 9 months ago
An Overview of The Mensurae Language: Specifying Business Processes
We describe a language which can be used to model business processes (both technical and nontechnical). It has a formal semantics, so as to enable formal analysis and prediction o...
T. S. E. Maibaum
BPM
2007
Springer
155views Business» more  BPM 2007»
14 years 1 months ago
Business Process Simulation for Operational Decision Support
Contemporary business process simulation environments are geared towards design-time analysis, rather than operational decision support over already deployed and running processes....
Moe Thandar Wynn, Marlon Dumas, Colin J. Fidge, Ar...
COOPIS
2002
IEEE
14 years 19 days ago
Finding Trading Partners to Establish Ad-hoc Business Processes
Enabling technology for realizing ad-hoc business processes currently is becoming more and more popular, like for example web services. Ad-hoc business processes are semantically c...
Andreas Wombacher, Bendick Mahleko
WSC
1998
13 years 9 months ago
Enterprise Architecture for Business Process Simulation
Many simulation systems are standalone, running only on a desktop and having limited capabilities to integrate with other technologies such as company databases, workflow engines,...
Ali Bahrami, Deborah A. Sadowski, Soheila Bahrami