Buscar
Mostrando ítems 11-20 de 70
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
An Open-Source Proactive Security Infrastructure for Business Process Management
(International Business Information Management Association (IBIMA), 2015)
Business Process Management Systems (BPMS) have emerged in the IT arena as cornerstone in the automation and orchestration of complex services for organizations. These systems manage critical information that is crucial ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Feature models to boost the vulnerability management process
(Elsevier Inc., 2023-01)
Vulnerability management is a critical and very challenging process that allows organisations to design a procedure to identify potential vulnerabilities, assess the level of risk, and define remediation mechanisms to ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Hybrid business process modeling for the optimization of outcome data
(Elsevier, 2016)
Context: Declarative business processes are commonly used to describe permitted and prohibited actions in a business process. However, most current proposals of declarative languages fail in three aspects: (1) they tend ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Resolución de acuerdos en Procesos de Negocio para Multiproceso Software usando Programación con Restricciones Distribuidas
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2010)
Un proceso de negocio consiste en un conjunto de actividades que trabajan de manera coordinada para obtener un objetivo común. A veces, la defiición del objetivo usando un acuerdo de proceso de negocio clásico no es ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Diagnosing Business Processes Execution using Choreography Analysis
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2008)
This work presents a proposal to diagnose business processes that form a global process using a choreography analysis. The diagnosis is based on distributed diagnosis since the business process is formed by a process ...
Tesis Doctoral
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Explaining the Incorrect Temporal Events during Business Process Monitoring by Means of Compliance Rules and Model-Based Diagnosis
(IEEE Computer Society, 2013)
Sometimes the business process model is not known completely, but a set of compliance rules can be used to describe the ordering and temporal relations between activities, incompatibilities, and existence dependencies in ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Feature models to boost the vulnerability management process
(Elsevier, 2022)
Vulnerability management is a critical and very challenging process that allows organisations to design a procedure to identify potential vulnerabilities, assess the level of risk, and define remediation mechanisms to ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models
(Springer, 2016)
Artifact-centric initiatives have been used in business processes whose data management is complex, being the simple activity centric workflow description inadequate. Several artifact-centric initia tives pursue the ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Fault diagnosis in databases for business processes
(PHM Society, 2010)
Business processes involve data that can be modified or updated by various activities. These data must satisfy the business rules associated to the process. As the information treated in a business process tends to be ...