: This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of acces...
Abstract: We present the live-representation approach for managing and working in complex, dynamic business processes. In this approach, aspects of business-process modeling, proje...
Daniel D. Corkill, Zachary B. Rubinstein, Susan E....
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
Process mining refers to the extraction of process models from event logs. Real-life processes tend to be less structured and more flexible. Traditional process mining algorithms ...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
Most information systems log events (e.g., transaction logs, audit trails) to audit and monitor the processes they support. At the same time, many of these processes have been expl...