Sciweavers

68 search results - page 8 / 14
» Model Checking of Security-Sensitive Business Processes
Sort
View
87
Voted
CAISE
2006
Springer
15 years 3 months ago
Modelling and Verifying of e-Commerce Systems
Static function hierarchies and models of the dynamic behaviour are typically used in e-commerce systems. Issues to be verifies are the completeness and correctness of the static f...
Andreas Speck
96
Voted
SE
2007
15 years 1 months ago
PDD applied: A model driven approach
: Property Driven Development is a methodology to check the validity of a distributed application and its conformance to specified requirements. A first prototype supporting this...
Helge Sören Klimek
CAISE
2010
Springer
15 years 23 days ago
Design and Verification of Instantiable Compliance Rule Graphs in Process-Aware Information Systems
For enterprises it has become crucial to check compliance of their business processes with certain rules such as medical guidelines or financial regulations. When automating compli...
Linh Thao Ly, Stefanie Rinderle-Ma, Peter Dadam
98
Voted
BPM
2010
Springer
191views Business» more  BPM 2010»
15 years 23 days ago
Correctness Ensuring Process Configuration: An Approach Based on Partner Synthesis
Abstract. A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is sub...
Wil M. P. van der Aalst, Niels Lohmann, Marcello L...
115
Voted
IRI
2008
IEEE
15 years 6 months ago
Model check stochastic supply chains
—Supply chain [2], [6] is an important component of business operations. Understanding its stochastic behaviors is the key to risk analysis and performance evaluation in supply c...
Li Tan, Shenghan Xu