Sciweavers

915 search results - page 31 / 183
» Security in Business Process Engineering
Sort
View
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 5 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
ROOM
2000
15 years 1 months ago
An Overview of The Mensurae Language: Specifying Business Processes
We describe a language which can be used to model business processes (both technical and nontechnical). It has a formal semantics, so as to enable formal analysis and prediction o...
T. S. E. Maibaum
BPM
2007
Springer
155views Business» more  BPM 2007»
15 years 6 months ago
Business Process Simulation for Operational Decision Support
Contemporary business process simulation environments are geared towards design-time analysis, rather than operational decision support over already deployed and running processes....
Moe Thandar Wynn, Marlon Dumas, Colin J. Fidge, Ar...
COOPIS
2002
IEEE
15 years 4 months ago
Finding Trading Partners to Establish Ad-hoc Business Processes
Enabling technology for realizing ad-hoc business processes currently is becoming more and more popular, like for example web services. Ad-hoc business processes are semantically c...
Andreas Wombacher, Bendick Mahleko
WSC
1998
15 years 1 months ago
Enterprise Architecture for Business Process Simulation
Many simulation systems are standalone, running only on a desktop and having limited capabilities to integrate with other technologies such as company databases, workflow engines,...
Ali Bahrami, Deborah A. Sadowski, Soheila Bahrami