Sciweavers

915 search results - page 93 / 183
» Security in Business Process Engineering
Sort
View
IJSI
2008
170views more  IJSI 2008»
13 years 9 months ago
Applying Value-Based Software Process: An ERP Example
Abstract Commercial organizations increasingly need software processes sensitive to business value, quick to apply, supportive of multi-stakeholder collaboration, and capable of ea...
LiGuo Huang, Barry W. Boehm, Hao Hu, Jian Lü,...
ER
2008
Springer
117views Database» more  ER 2008»
13 years 10 months ago
On the Formal Semantics of Change Patterns in Process-Aware Information Systems
Due to a turbulent market enterprises should be able to adapt their business processes in a quick and flexible way. This requires adaptive process-aware information systems (PAISs)...
Stefanie Rinderle-Ma, Manfred Reichert, Barbara We...
ICWS
2010
IEEE
13 years 10 months ago
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality
Abstract--Most work on adaptive workflows offers insufficient flexibility to enforce complex policies regarding dynamic, evolvable and robust workflows. In addition, many proposed ...
Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wo...
CAISE
2006
Springer
14 years 21 days ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
CISIS
2009
IEEE
14 years 3 months ago
Strengths and Weaknesses of Maturity Driven Process Improvement Effort
In the recent decades most of the big organizations have adopted maturity driven process improvement efforts (MDPI). Most of these efforts have been inspired of maturity models li...
Asadullah Shaikh, Ashfaq Ahmed, Nasrullah Memon, M...