Sciweavers

2538 search results - page 345 / 508
» Business Process Cockpit
Sort
View
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 7 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
APN
2008
Springer
15 years 6 months ago
Synthesis of Petri Nets from Scenarios with VipTool
The aim of this tool paper is twofold: First we show that VipTool [9, 2] can now synthesize Petri nets from partially ordered runs. To integrate this extension and further new func...
Robin Bergenthum, Jörg Desel, Robert Lorenz, ...
MKWI
2008
137views Business» more  MKWI 2008»
15 years 5 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann
MKWI
2008
108views Business» more  MKWI 2008»
15 years 5 months ago
Empirical-Based Construction of Reference Models in Public Administrations
: This paper introduces a tailored procedure model to construct reference models by using rich empirical data. The procedure model has been built based on requirements from the pub...
Milan Karow, Daniel Pfeiffer, Michael Räckers
IADT
1998
146views more  IADT 1998»
15 years 5 months ago
An Open Architecture for Adaptive Workflow Management Systems
One of the main tasks of workflow management systems is the coordination of activities in business processes. This paper introduces a solution framework to support adaptive workfl...
Reiner Siebert