Business process as a service: Chances for remote auditing

R Accorsi - 2011 IEEE 35th Annual Computer Software and …, 2011 - ieeexplore.ieee.org
The advent of cloud computing allows the provision of several commodities" as-a-service".
For enterprise systems, a particularly interesting business model is the offer of configurable …

Programming moves: Design and evaluation of applying embodied interaction in virtual environments to enhance computational thinking in middle school students

D Parmar, J Isaac, SV Babu, N D'Souza… - 2016 IEEE Virtual …, 2016 - ieeexplore.ieee.org
We detail the design, implementation, and an initial evaluation of a virtual reality education
and entertainment (edutainment) application called Virtual Environment Interactions (VEnvI) …

The consistency of task-based authorization constraints in workflow

K Tan, J Crampton, CA Gunter - Proceedings. 17th IEEE …, 2004 - ieeexplore.ieee.org
Workflow management systems (WFMSs) have attracted a lot of interest both in academia
and the business community. A workflow consists of a collection of tasks that are organized …

Information flow control in cloud computing

R Wu, GJ Ahn, H Hu, M Singhal - 6th International Conference …, 2010 - ieeexplore.ieee.org
Cloud computing is an emerging computing paradigm where computing resources are
provided as services over Internet while residing in a large data center. Even though it …

Security for workflow systems

V Atluri, J Warner - Handbook of database security: applications and …, 2008 - Springer
Workflow technology is often employed by organizations to automate their day-to-day
business processes. The primary advantage of adopting workflow technology is to separate …

Automated certification for compliant cloud-based business processes

R Accorsi, L Lowis, Y Sato - Business & Information Systems Engineering, 2011 - Springer
A key problem in the deployment of large-scale, reliable cloud computing concerns the
difficulty to certify the compliance of business processes operating in the cloud. Standard …

Information leak detection in business process models: Theory, application, and tool support

R Accorsi, A Lehmann, N Lohmann - Information Systems, 2015 - Elsevier
Despite the correct deployment of access control mechanisms, information leaks can persist
and threaten the reliability of business process execution. This paper presents an automated …

Dynamic workflow model fragmentation for distributed execution

W Tan, Y Fan - Computers in Industry, 2007 - Elsevier
Workflow fragments are partitions of workflow model, and workflow model fragmentation is to
partition a workflow model into fragments, which can be manipulated by multiple workflow …

Secure collaboration in mediator-free environments

M Shehab, E Bertino, A Ghafoor - … of the 12th ACM conference on …, 2005 - dl.acm.org
The internet and related technologies have made multidomain collaborations a reality.
Collaboration enables domains to effectively share resources; however it introduces several …

Automatic information flow analysis of business process models

R Accorsi, A Lehmann - International Conference on Business Process …, 2012 - Springer
We present an automated and efficient approach for the verification of information flow
control for business process models. Building on the concept of Place-based Non …