Sciweavers

915 search results - page 37 / 183
» Security in Business Process Engineering
Sort
View
STTT
2008
124views more  STTT 2008»
13 years 7 months ago
Protos2CPN: using colored Petri nets for configuring and testing business processes
Protos is a popular tool for business process modelling used in more than 1500 organizations. It has a built-in Petri-net-based simulation engine which shows key performance indica...
Florian Gottschalk, Wil M. P. van der Aalst, Moniq...
IEEEARES
2006
IEEE
14 years 1 months ago
A Declarative Control Language for Dependable XML Message Queues
We present a novel approach for the implementation of efficient and dependable web service engines (WSEs). A WSE instance represents a single node in a distributed network of par...
Alexander Böhm 0002, Carl-Christian Kanne, Gu...
COMPSAC
2009
IEEE
14 years 2 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
ASWEC
2008
IEEE
13 years 9 months ago
Towards Formalizing Resource Based Non-conformance in Business
The research presented in the literature thus far on process deviations, inconsistencies and general nonconformance have all been very generic, process wide methodologies. Their a...
Sean Thompson, Torab Torabi
ICSM
2005
IEEE
14 years 1 months ago
Using Self-Reconfigurable Workplaces to Automate the Maintenance of Evolving Business Applications
In this ever changing business environment, business processes are constantly being customized to reflect the up-to-date organizational structure and business objectives. Technolo...
Qi Zhang, Ying Zou