: Business process modeling and design, as an essential part of business process management, has gained much attention in recent years. An important tool for this purpose is refere...
Business processes are becoming more and more complex and at the same time their correctness is becoming a critical issue: The costs of errors in business information systems are g...
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Abstract. In requirements engineering use cases are employed to describe the ow of events and the occurrence of states in a future information system. Use cases consist of a set of...
The dynamic nature of Service-Oriented Architectures challenges traditional systems management practices which tend to be static in nature. We propose a goal-oriented, agent-based...
Patrick Martin, Wendy Powley, Imad Abdallah, Jun L...