منابع مشابه
Privacy Preserving Business Process Fusion
Virtual enterprises (VEs) are temporary and loosely coupled alliances of businesses that join their skills to catch new business opportunities. However, the dependencies among the activities of a prospective VE cross the boundaries of the VE constituents. It is therefore crucial to allow the VE constituents to discover their local views of the interorganizational workflow, enabling each company...
متن کاملChallenges in Business Process Analysis
Business process analysis ranges from model verification at design-time to the monitoring of processes at run-time. Much progress has been achieved in process verification. Today we are able to verify the entire reference model of SAP without any problems. Moreover, more and more processes leave their “trail” in the form of event logs. This makes it interesting to apply process mining to these ...
متن کاملSemantic Business Process Analysis
Current Business Process Management technologies cover all the process life-cycle but still suffer from many limitations with respect to their complexity, maintainability and degree of automation. Recent research initiatives aim at overcoming these limitations by introducing Semantic technologies in the process life-cycle, mainly in the modeling and execution phases. But other steps of the proc...
متن کاملBusiness Process Analysis
Business-process management (BPM) is nowadays a key technology for the automation and support of processes in medium-sized and large organizations. This technology has been successfully applied to business-to-consumer (B2C) and business-to-business (B2B) e-commerce since the ’90s, and it is now being applied also in e-government for the management of administrative procedures. As stated in Aals...
متن کاملA Data-Centric Approach for Privacy-Aware Business Process Enablement
In a SOA context, enterprises can use workflow technologies to orchestrate available business processes and their corresponding services and apply business rules or policies to control how they can be used and who can use them. This approach becomes a bit more complex when a set of business processes includes services that derive outside the company's domain and therefore can be difficult to al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatik Spektrum
سال: 2019
ISSN: 0170-6012,1432-122X
DOI: 10.1007/s00287-019-01204-y