Business process management: a comprehensive survey

WMP Van der Aalst - International Scholarly Research Notices, 2013 - Wiley Online Library
Business Process Management (BPM) research resulted in a plethora of methods,
techniques, and tools to support the design, enactment, management, and analysis of …

Process mining in the large: a tutorial

WMP Van der Aalst - … Intelligence: Third European Summer School, eBISS …, 2014 - Springer
Recently, process mining emerged as a new scientific discipline on the interface between
process models and event data. On the one hand, conventional Business Process …

A survey on provenance: What for? What form? What from?

M Herschel, R Diestelkämper, H Ben Lahmar - The VLDB Journal, 2017 - Springer
Provenance refers to any information describing the production process of an end product,
which can be anything from a piece of digital data to a physical object. While this survey …

The foundations for provenance on the web

L Moreau - Foundations and Trends® in Web Science, 2010 - nowpublishers.com
Provenance, ie, the origin or source of something, is becoming an important concern, since it
offers the means to verify data products, to infer their quality, to analyse the processes that …

A markov prediction model for data-driven semi-structured business processes

GT Lakshmanan, D Shamsi, YN Doganata… - … and information systems, 2015 - Springer
In semi-structured case-oriented business processes, the sequence of process steps is
determined by case workers based on available document content associated with a case …

Data provenance to audit compliance with privacy policy in the Internet of Things

T Pasquier, J Singh, J Powles, D Eyers… - Personal and Ubiquitous …, 2018 - Springer
Managing privacy in the IoT presents a significant challenge. We make the case that
information obtained by auditing the flows of data can assist in demonstrating that the …

Business process simulation revisited

WMP van der Aalst - Workshop on enterprise and organizational modeling …, 2010 - Springer
Computer simulation attempts to “mimic” real-life or hypothetical behavior on a computer to
see how processes or systems can be improved and to predict their performance under …

[HTML][HTML] A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions

M Leitner, S Rinderle-Ma - Information and Software Technology, 2014 - Elsevier
Abstract Context Security in Process-Aware Information Systems (PAIS) has gained
increased attention in current research and practice. However, a common understanding …

A templating system to generate provenance

L Moreau, BV Batlajery, TD Huynh… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
PROV-TEMPLATEIS a declarative approach that enables designers and programmers to
design and generate provenance compatible with the PROV standard of the World Wide …

Business process as a service: Chances for remote auditing

R Accorsi - 2011 IEEE 35th Annual Computer Software and …, 2011 - ieeexplore.ieee.org
The advent of cloud computing allows the provision of several commodities" as-a-service".
For enterprise systems, a particularly interesting business model is the offer of configurable …