Business Process Privacy Analysis in Pleak

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Preserving Business Process Fusion

Virtual enterprises (VEs) are temporary and loosely coupled alliances of businesses that join their skills to catch new business opportunities. However, the dependencies among the activities of a prospective VE cross the boundaries of the VE constituents. It is therefore crucial to allow the VE constituents to discover their local views of the interorganizational workflow, enabling each company...

متن کامل

Challenges in Business Process Analysis

Business process analysis ranges from model verification at design-time to the monitoring of processes at run-time. Much progress has been achieved in process verification. Today we are able to verify the entire reference model of SAP without any problems. Moreover, more and more processes leave their “trail” in the form of event logs. This makes it interesting to apply process mining to these ...

متن کامل

Semantic Business Process Analysis

Current Business Process Management technologies cover all the process life-cycle but still suffer from many limitations with respect to their complexity, maintainability and degree of automation. Recent research initiatives aim at overcoming these limitations by introducing Semantic technologies in the process life-cycle, mainly in the modeling and execution phases. But other steps of the proc...

متن کامل

Business Process Analysis

Business-process management (BPM) is nowadays a key technology for the automation and support of processes in medium-sized and large organizations. This technology has been successfully applied to business-to-consumer (B2C) and business-to-business (B2B) e-commerce since the ’90s, and it is now being applied also in e-government for the management of administrative procedures. As stated in Aals...

متن کامل

A Data-Centric Approach for Privacy-Aware Business Process Enablement

In a SOA context, enterprises can use workflow technologies to orchestrate available business processes and their corresponding services and apply business rules or policies to control how they can be used and who can use them. This approach becomes a bit more complex when a set of business processes includes services that derive outside the company's domain and therefore can be difficult to al...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Informatik Spektrum

سال: 2019

ISSN: 0170-6012,1432-122X

DOI: 10.1007/s00287-019-01204-y