Sciweavers

177 search results - page 12 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
COMPUTER
2004
79views more  COMPUTER 2004»
15 years 1 months ago
Extending the Reach of Business Processes
partners are abstracted as Web services, we have introduced additional constructs to represent human users and define human interaction patterns. Each business process defined in o...
Dipanjan Chakraborty, Hui Lei
RSCTC
1998
Springer
175views Fuzzy Logic» more  RSCTC 1998»
15 years 6 months ago
Business Process Understanding: Mining Many Datasets
Abstract. Institutional databases can be instrumental in understanding a business process, but additional data may broaden the empirical perspective on the investigated process. We...
Jan M. Zytkow, Arun P. Sanjeev
148
Voted
ICWS
2009
IEEE
14 years 11 months ago
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestr...
Federica Paci, Rodolfo Ferrini, Elisa Bertino
105
Voted
JIIS
2002
118views more  JIIS 2002»
15 years 1 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...
121
Voted
CCS
2009
ACM
16 years 2 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin