Filters








1,400 Hits in 0.91 sec

Modeling Wizard for Confidential Business Processes [chapter]

Andreas Lehmann, Niels Lohmann
2013 Lecture Notes in Business Information Processing  
The proposed technique can be integrated into the design phase of a service-oriented business process and help the modeler choose which tasks can be safely outsourced.  ...  To this end, a model is required in which each task is assessed as either confidential or public.  ...  Background We consider the Petri net representation of business process models as a basis for the analysis.  ... 
doi:10.1007/978-3-642-36285-9_67 fatcat:4j3jqwfbmbd6vpdivrlhdm2vte

Workshop on Security in Business Processes - A workshop report

Rafael Accorsi, Raimundas Matulevičius
2015 Enterprise Modelling and Information Systems Architectures - An International Journal  
The Workshop on Security in Business Processes (SBP'12) was organised in conjunction with the 10th international conference on Business Process Management (BPM 2012).  ...  These were the perspectives of secure business processes, security and compliance, security and Internet services, and engineering secure business processes.  ...  Engineering Secure Business Processes In presenting the first paper in this session, Modeling Wizard for Confidential Business Processes by Andreas Lehmann and Niels Lohmann, Andreas Lehmann looked into  ... 
doi:10.18417/emisa.8.1.5 dblp:journals/emisaij/AccorsiM13 fatcat:7umqptnvqfhztfkvwlxu5kxz3i

Security Design Patterns in the MASTER Workbench [chapter]

Paul J. Kearney, David A. Sinclair, Sebastian Wagner
2014 Cyberpatterns  
Index Terms-business process, design pattern, model-driven design, security  ...  The Workbench supports a model-driven design process within the overall MASTER methodology.  ...  Figure 2 PRM Instantiation Wizard After the user has provided the values for each parameter she finishes the wizard and the PRM is instantiated by creating a new design model out of it that is stored in  ... 
doi:10.1007/978-3-319-04447-7_15 fatcat:asswo3ugybgtnghg45m6ub4ivi

Page 56 of APCJ Faxnews Vol. 77, Issue 31 [page]

1993 APCJ Faxnews  
B Processes, Bic. - $40's 20 HP Hockmeyer Model HV20 Sr. Chemist - Deg. . orm. Exp. Container Cigs.- Mid $40 a ockmeyer Mode: é or mist 4 mu. Exp.  ...  M S » 10 EE 5 HP Patterson Wizard Dispersers (3) ‘ioe S6sMe sgtrdasian ; 5 HP Cowles Model 5VTV (4) Stsman - Wood Cigs. - Flatline, Cabinets, Furniture, Hi-Base + Incentives 7 HP Cowles Model 7VTV Sr.  ... 

Sales-supporting e-services

E. van de Kar, P. Herder, A. Snijders, W. Dik
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
We used the SSEQ model at GE Plastics for generating 36 new e-services (by means of brainstorming sessions and interviews), for pre-selecting e-services, for implementing one new e-service (Web Radar)  ...  In the ever-increasing number of services offered through the Internet channel, more sophisticated eservices can be found in the business-to-business market.  ...  The exact financial data cannot be conveyed, for reasons of confidentiality.  ... 
doi:10.1109/hicss.2004.1265211 dblp:conf/hicss/KarHSD04 fatcat:iz63jazexncplp74gmes2vivia

Web Services as A Solution for Cloud Enterprise Resource Planning Interoperability

Djamal Ziani
2020 Zenodo  
Thus, we propose web services as a solution for cloud ERP interoperability.  ...  As a result, potential business sensitive and confidential data are at risk from insider attacks.  ...  ERP systems took enterprises to a higher level in integrating business processes, including all enterprise systems [6] .  ... 
doi:10.5281/zenodo.3697410 fatcat:dc32hzuosbct7m5ftm6wkrtzbe

Service Based Cooperation Patterns to Support Flexible Inter-Organizational Workflows

Saida Boukhedouma, Mourad Oussalah, Zaia Alimazighi, Dalila Tamzalit
2014 International Journal of Information Technology and Computer Science  
For that, we introduce the concept of Service-Based Cooperation Pattern (SBCP) that supports the definition of IOWF models based on services.  ...  Service Oriented Architecture (SOA) is a paradigm that provides important advantages like interoperability, reusability and flexibility, particularly beneficial for B2B applications.  ...  Acknowledgments We would like to thank our students Bouchekir Redouane,and Hermez Dalil for their participation in the design and implementation of the cooperation framework.  ... 
doi:10.5815/ijitcs.2014.04.01 fatcat:j7cnqi76yfd2fp2x3kasnjbad4

The Man behind the Curtain: Exploring the Role of IS Strategic Consultant [chapter]

Riccardo Bonazzi, Charlotte Ceccaroli, Stéphanie Missonier
2011 Lecture Notes in Business Information Processing  
Our theoretical model shows how a consultancy can assess the way to extract and to generalize knowledge from its clients.  ...  Most organizations encounter business-IT alignment problems because they fail to properly understand how well an enterprise software package aligns with or fits their needs.  ...  In section 6 we present a possible use of our theoretical model by presenting a set of business model components for a consultancy.  ... 
doi:10.1007/978-3-642-22056-2_7 fatcat:4iybjdjotfdlphh674yb436hu4

Business Processes As A Service (Bpaas): A Model-Based Approach To Align Business With Cloud Offerings

Robert Woitsch, Wilfrid Utz
2015 Zenodo  
This paper introduces the project idea of the H2020 project CloudSocket, by elaborating the idea of Business Processes as a Service (BPaaS), where concept models and semantics are applied to align business  ...  The hybrid usage of conceptual and semantic models introduce smart knowledge processing mechanisms to bridge the semantic gap from business requests to deployable workflow bundle.  ...  A model-based smart Wizard uses semantic inference to identify the most appropriate BPaaS in production for the marketplace user.  ... 
doi:10.5281/zenodo.35583 fatcat:3r37pwapdjg2jmdycgex6jl4ma

The Virtual Enterprise from a Governance Perspective [chapter]

David Romero, Ana Inês Oliveira, Luis M. Camarinha-Matos, Arturo Molina
2010 IFIP Advances in Information and Communication Technology  
Virtual Enterprises (VEs) are temporary alliances of enterprises that share a common goal towards responding to a competitive collaboration or business opportunity.  ...  This paper presents the VE from a governance perspective and how fundamental the negotiation process in the VE creation phase can be.  ...  Table 4a describes the VE creation process when a contract for a new collaboration or business opportunity is already guaranteed, while in contrast, Table 4b describes a scenario where the collaboration  ... 
doi:10.1007/978-3-642-11628-5_8 fatcat:zw3p6rzuf5ar5cpbfqr7he4yhe

Adaptation patterns for service based inter-organizational workflows

Saida Boukhedouma, Mourad Oussalah, Zaia Alimazighi, Dalila Tamzalit
2013 IEEE 7th International Conference on Research Challenges in Information Science (RCIS)  
Then, we state a set of recurrent operations of adaptation (attached to process and interaction aspects) that can be applied on service-based IOWF models, and we illustrate their implementation for IOWF  ...  This paper focuses on specific and well common IOWFarchitectures defined in the literature; it deals with adaptation of IOWF process models obeying to these architectures.  ...  ACKNOWLEDGMENT We would like to thank our students Djamel-Eddine Khelladi and Younes Asma for their participation in the implementation of the framework.  ... 
doi:10.1109/rcis.2013.6577722 dblp:conf/rcis/BoukhedoumaOAT13 fatcat:nxqhz7lcfjcdzg6mr3idsomyym

A Study on Generic Data Analysis Application the Cloud Using SGX

S. Baskaran, S. Venkatesan
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
The analysis itself however in the midst of preparation and post-processing steps.  ...  with extra algorithms by exploitation associate OSGi compliant design. the software package and therefore the hypervisor out of the TCB; therefore, confidentiality and integrity square measure preserved  ...  appropriate for the info. business tools typically offer "Wizards" that facilitate users with modelling decisions, however this can be less supported in free tools or tools that have a lot of general  ... 
doi:10.32628/cseit195363 fatcat:m6hc2zbamvcx3i73w2kkvb2dw4

Chip-Secured Data Access [chapter]

Luc Bouganim, François Dang Nogc, Philippe Pucheral, Lilan Wu
2003 Proceedings 2003 VLDB Conference  
Most DSP provide wizards to create in minutes predesigned or customized business-oriented shared databases.  ...  For each inequality predicate, the smartcard does the following pre-processing.  ... 
doi:10.1016/b978-012722442-8/50123-3 dblp:conf/vldb/BouganimNPW03 fatcat:cqqhfprbdverhp3q4mmys2fqgq

Intelligent Assistant for Context-Aware Policies

Helen Balinsky, Neil C. A. Moore, Steven J. Simske
2011 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications  
We provide a novel Intelligent Modeling Assistant (IMA) that automatically deals with resolvable complications in modelling, while breaking tasks requiring manual intervention into a set of simple decisions  ...  Unlike traditional metadata based policies, context-aware policies do not need to have any overlap in their conditions for contradictions to occur, which makes it harder to create and manage coherent,  ...  However changes to the database are only committed at the end of the wizard, so it can be used for exploratory modelling.  ... 
doi:10.1109/trustcom.2011.80 dblp:conf/trustcom/BalinskyMS11 fatcat:muuzfl4sqjbqjndg7p6hicdqja

Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users [chapter]

Anton Palazov
2011 Lecture Notes in Computer Science  
A model of anti-theft technology implementation, which disables stolen computers and can send them data-destructive commands to erase sensitive data ,is presented.  ...  The users of eGovernment services start exchanging documents with administrative authorities, making ePayments, and in such communications the risks of confidential information disclosure and direct financial  ...  • Integration of DLP technologies with other services like e-mail, instant messaging, Skype, social networking, etc would be a challenge and a big advantage for eGovernment services users.  ... 
doi:10.1007/978-3-642-19228-9_10 fatcat:as3nkfyhbbhybm4e2tyhph6mni
« Previous Showing results 1 — 15 out of 1,400 results