Buscar
Mostrando ítems 11-20 de 58
Artículo
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework
(Elsevier, 2012)
Design, development, and maintenance of firewall ACLs are very hard and error-prone tasks. Two of the reasons for these difficulties are, on the one hand, the big gap that exists between the access control requirements ...
Tesis Doctoral
Ponencia
Explaining the Incorrect Temporal Events during Business Process Monitoring by Means of Compliance Rules and Model-Based Diagnosis
(IEEE Computer Society, 2013)
Sometimes the business process model is not known completely, but a set of compliance rules can be used to describe the ordering and temporal relations between activities, incompatibilities, and existence dependencies in ...
Ponencia
A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models
(Springer, 2016)
Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple activity centric workflow description inadequate. Several artifact-centric initia tives pursue the ...
Tesis Doctoral
OPBUS : A Framework for Improving the Dependability of Risk-Aware Business processes
(2013)
Hoy en día existe una creciente tendencia a externalizar y automatizar procesos críticos y complejos mediante el uso de sistemas de gestión de procesos de negocio. Estos procesos son cada vez más frecuentemente amenazados ...
Ponencia
Fault diagnosis in databases for business processes
(PHM Society, 2010)
Business processes involve data that can be modified or updated by various activities. These data must satisfy the business rules associated to the process. As the information treated in a business process tends to be ...
Ponencia
Diagnosis de Errores en la Gestión de Procesos Software con Programación con Restricciones
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2010)
El desarrollo de proyectos software similares es habitual en las empresas de desarrollo de software. Esto proporciona una base de conocimiento sobre cómo se han comportado otros proyectos similares y la posibilidad de ...
Ponencia
PAIS-DQ: Extending Process-Aware Information Systems to support Data Quality in PAIS life-cycle
(IEEE Computer Society, 2016)
The successful execution of a Business Process implies to use data with an adequate level of quality, thereby enabling the output of processes to be obtained in accordance with users requirements. The necessity to be ...
Artículo
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
(Elsevier, 2013)
Context: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these systems, ...
Ponencia
OPBUS: Risk-aware framework for the conformance of security-quality requirements in business processes
(IEEE Computer Society, 2011)
Several reports indicate that one of the most important business priorities is the improvement of business and IT management. Nowadays, business processes and in general service-based ones use other external services ...