Sciweavers

378 search results - page 25 / 76
» Security requirement analysis of business processes
Sort
View
IEEEARES
2010
IEEE
14 years 2 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
EWCBR
2006
Springer
13 years 11 months ago
Case-Based Support for Collaborative Business
This paper describes the development of the generic collaboration support architecture CAKE incorporating case-based reasoning (CBR). CAKE provides unified access to knowledge avai...
Ralph Bergmann, Andrea Freßmann, Kerstin Max...
EKAW
1992
Springer
13 years 11 months ago
eQuality: An Application of DDucks to Process Management
Process management is a method for improving Boeing's business processes, however many aspects have been difficult to implement. eQuality is a software system based on a frame...
Jeffrey Bradshaw, Peter Holm, Oscar Kipersztok, Th...
SERA
2010
Springer
13 years 6 months ago
Representing Unique Stakeholder Perspectives in BPM Notations
—Evidence shows that proposals for new modeling notations emerge and evolution of current ones are becoming more complex, often in an attempt to satisfy the many different modeli...
Carlos Monsalve, Alain April, Alain Abran
SAC
2008
ACM
13 years 7 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer