Sciweavers

177 search results - page 8 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
POLICY
2007
Springer
15 years 5 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
MODELLIERUNG
2008
15 years 1 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
ECIS
2004
15 years 1 months ago
Electronic business models: five cases from five industries
The term business model has been used loosely several times for describing a company's strategies, revenue model, processes and overall business logic both by researchers and...
Aleksi Horsti, Jyrki Tolonen, Malin Brännback
IQ
2007
15 years 1 months ago
An Alert Management Approach To Data Quality: Lessons Learned From The Visa Data Authority Program
: We introduce an end-to-end framework for data quality that integrates business strategy, data quality models, and supporting investigative and governance processes. We also descr...
Joseph Bugajski, Robert L. Grossman
BPSC
2009
190views Business» more  BPSC 2009»
15 years 25 days ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann