Sciweavers

49 search results - page 3 / 10
» Formalizing Dependencies in Business Process Models Using Co...
Sort
View
PDPTA
2003
13 years 7 months ago
The Application of Software Process Precedence Relationship Formalisms to Concurrent Hardware Systems
In this paper, precedence constraint combination formalisms defined in the software domain are used to define the behavior of hardware systems. Specifically, AND-join and various ...
Kenneth G. Ricks, David Jeff Jackson, B. Earl Well...
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
14 years 28 days ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...
BPM
2007
Springer
148views Business» more  BPM 2007»
14 years 13 days ago
Requirements-Driven Design and Configuration Management of Business Processes
The success of a business process (BP) depends on whether it meets its business goal as well as non-functional requirements associated with it. BP specifications frequently need to...
Alexei Lapouchnian, Yijun Yu, John Mylopoulos
BPM
2006
Springer
149views Business» more  BPM 2006»
13 years 8 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
IFIP
2009
Springer
13 years 4 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta