Although requirements analysis is acknowledged as a critical success factor of information system development for organizations, problems related to the requirements stage are freq...
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
The existence of variations in the organizational environment makes the configuration of business process models a complex activity, even for experienced business analysts. The inc...