Buscar
Mostrando ítems 31-40 de 70
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
(IEEE Computer Society, 2019)
Organizations execute daily activities to meet their objectives. The performance of these activities can be fundamental for achieving a business objective, but they also imply the assumption of certain security risks ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Competitive Intelligence based on Social Networks for Decision Making
(SISTEDES: Ingeniería de Software y las Tecnologías de Desarrollo de Software, 2009)
In previous works a framework has been presented to extract from internet the scientific community interested in a specific topic. The process uses search engines query results and e-mails address co-occurrences to obtain ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Automating correctness verification of artifact-centric business process models
(Elsevier, 2015)
Context: The artifact-centric methodology has emerged as a new paradigm to support business process management over the last few years. This way, business processes are described from the point of view of the artifacts ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Prognosis of multiple instances in time-aware declarative business process models
(Elsevier, 2020)
Technological evolution, heading for industry 4.0, makes companies tend to automate their managementand operation, ideally defining it through business process models. To describe policies or rules relatedto the execution ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Governance Knowledge Management and Decision Support Using Fuzzy Governance Maps
(Springer, 2016)
Business process management systems incorporate the pos sibility of monitoring the behaviour of a company, by observing their business process indicators. Depending on the process executed, and the order of their ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Decision-making support for input data in business processes according to former instances
(ComSIS Consortium, 2021)
Business Processes facilitate the execution of a set of activities to achieve the strategic plans of a company. During the execution of a business process model, several decisions can be made that frequently involve the ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Reasoning on the usage control security policies over data artifact business process models
(ComSIS Consortium, 2022)
The inclusion of security aspects in organizations is a crucial aspect to ensure compliance with both internal and external regulations. Business process models are a well-known mechanism to describe and automate the ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Extending BPMN 2.0 for Modelling the Combination of Activities That Involve Data Constraints
(Springer, 2012)
The combination of activities to achieve optimal goals sometimes has a complex solution. Business Process Model and Notation (BPMN) 2.0 facilitates the modelling of business processes by providing new artifacts, such ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Verifying the manipulation of data objects according to business process and data models
(Springer, 2020)
Business processes read and write data objects, usually stored in databases. Although data models and activity-oriented business process models originate from different paradigms, they need to work together properly. The ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Run-Time Auditing for Business Processes Data Using Constraints
(Springer, 2010)
Business processes involve data that can be modified or up dated by various activities. These data must satisfy the business rules associated to the process. These data are normally stored in a rela tional database, and ...