Sciweavers

378 search results - page 11 / 76
» Security requirement analysis of business processes
Sort
View
GI
1998
Springer
13 years 11 months ago
Business Object Facilities - A Comparative Analysis
Rapidlychanging business processes require quick adaption of supportinginformationsystems. Component technologies in general and business objects, in particular seem a promising a...
Wolfgang Emmerich, Ernst Ellmer, Birgit Osterholt,...
BPM
2009
Springer
126views Business» more  BPM 2009»
13 years 11 months ago
Micro Workflow Gestural Analysis: Representation in Social Business Processes
Abstract. Enterprises are finding limitations with current modelling and hierarchical methodologies which have human agents as a key component. By requiring a priori knowledge of b...
Ben Jennings, Anthony Finkelstein
RE
2006
Springer
13 years 7 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
FGCS
2007
129views more  FGCS 2007»
13 years 7 months ago
Analysis of business process integration in Web service context
The integration of Web services is a recent outgrowth of the Business Process integration field that will require powerful meta-schema mechanisms supported by higher level abstra...
Jun Shen, Georg Grossmann, Yun Yang, Markus Stumpt...
ESWS
2007
Springer
14 years 1 months ago
Towards an Ontology for Process Monitoring and Mining
Abstract. Business Process Analysis (BPA) aims at monitoring, diagnosing, simulating and mining enacted processes in order to support the analysis and enhancement of process models...
Carlos Pedrinaci, John Domingue