Buscar
Mostrando ítems 1-4 de 4
Artículo
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
(Elsevier, 2013)
Context: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these systems, ...
Artículo
Compliance validation and diagnosis of business data constraints in business processes at runtime
(Elsevier, 2015)
Business processes involve data that can be modified and updated by various activities at any time. The data involved in a business process can be associated with flow elements or data stored. These data must satisfy the ...
Artículo
Formalization of security patterns as a means to infer security controls in business processes
(Oxford University Press, 2015)
The growing trend towards the automation and externalization of business processes by means of Technology Infrastructure (TI), such as Business Process Management Systems, has increased the security risks in the organizations. ...
Artículo
Using Constraint Programming in Selection Operators for Constraint Databases
(Elsevier, 2014)
Constraint Databases represent complex data by means of formulas described by constraints (equations, inequations or Boolean combinations of both). Commercial database management systems allow the storage and efficient ...