Sciweavers

915 search results - page 31 / 183
» Security in Business Process Engineering
Sort
View
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 2 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
ROOM
2000
14 years 11 months ago
An Overview of The Mensurae Language: Specifying Business Processes
We describe a language which can be used to model business processes (both technical and nontechnical). It has a formal semantics, so as to enable formal analysis and prediction o...
T. S. E. Maibaum
BPM
2007
Springer
155views Business» more  BPM 2007»
15 years 3 months ago
Business Process Simulation for Operational Decision Support
Contemporary business process simulation environments are geared towards design-time analysis, rather than operational decision support over already deployed and running processes....
Moe Thandar Wynn, Marlon Dumas, Colin J. Fidge, Ar...
COOPIS
2002
IEEE
15 years 2 months ago
Finding Trading Partners to Establish Ad-hoc Business Processes
Enabling technology for realizing ad-hoc business processes currently is becoming more and more popular, like for example web services. Ad-hoc business processes are semantically c...
Andreas Wombacher, Bendick Mahleko
88
Voted
WSC
1998
14 years 11 months ago
Enterprise Architecture for Business Process Simulation
Many simulation systems are standalone, running only on a desktop and having limited capabilities to integrate with other technologies such as company databases, workflow engines,...
Ali Bahrami, Deborah A. Sadowski, Soheila Bahrami