Business process as a service: Chances for remote auditing
R Accorsi - 2011 IEEE 35th Annual Computer Software and …, 2011 - ieeexplore.ieee.org
The advent of cloud computing allows the provision of several commodities" as-a-service".
For enterprise systems, a particularly interesting business model is the offer of configurable …
For enterprise systems, a particularly interesting business model is the offer of configurable …
Programming moves: Design and evaluation of applying embodied interaction in virtual environments to enhance computational thinking in middle school students
We detail the design, implementation, and an initial evaluation of a virtual reality education
and entertainment (edutainment) application called Virtual Environment Interactions (VEnvI) …
and entertainment (edutainment) application called Virtual Environment Interactions (VEnvI) …
The consistency of task-based authorization constraints in workflow
Workflow management systems (WFMSs) have attracted a lot of interest both in academia
and the business community. A workflow consists of a collection of tasks that are organized …
and the business community. A workflow consists of a collection of tasks that are organized …
Information flow control in cloud computing
Cloud computing is an emerging computing paradigm where computing resources are
provided as services over Internet while residing in a large data center. Even though it …
provided as services over Internet while residing in a large data center. Even though it …
Security for workflow systems
V Atluri, J Warner - Handbook of database security: applications and …, 2008 - Springer
Workflow technology is often employed by organizations to automate their day-to-day
business processes. The primary advantage of adopting workflow technology is to separate …
business processes. The primary advantage of adopting workflow technology is to separate …
Automated certification for compliant cloud-based business processes
R Accorsi, L Lowis, Y Sato - Business & Information Systems Engineering, 2011 - Springer
A key problem in the deployment of large-scale, reliable cloud computing concerns the
difficulty to certify the compliance of business processes operating in the cloud. Standard …
difficulty to certify the compliance of business processes operating in the cloud. Standard …
Information leak detection in business process models: Theory, application, and tool support
Despite the correct deployment of access control mechanisms, information leaks can persist
and threaten the reliability of business process execution. This paper presents an automated …
and threaten the reliability of business process execution. This paper presents an automated …
Dynamic workflow model fragmentation for distributed execution
W Tan, Y Fan - Computers in Industry, 2007 - Elsevier
Workflow fragments are partitions of workflow model, and workflow model fragmentation is to
partition a workflow model into fragments, which can be manipulated by multiple workflow …
partition a workflow model into fragments, which can be manipulated by multiple workflow …
Secure collaboration in mediator-free environments
The internet and related technologies have made multidomain collaborations a reality.
Collaboration enables domains to effectively share resources; however it introduces several …
Collaboration enables domains to effectively share resources; however it introduces several …
Automatic information flow analysis of business process models
R Accorsi, A Lehmann - International Conference on Business Process …, 2012 - Springer
We present an automated and efficient approach for the verification of information flow
control for business process models. Building on the concept of Place-based Non …
control for business process models. Building on the concept of Place-based Non …