A Privacy-Sensitive Collaborative Approach to Business Process Development
暂无分享,去创建一个
Basit Shafiq | Jaideep Vaidya | Nabil R. Adam | Hafiz Salman Asif | Hassaan Irshad | Muhammad Ahmed Bashir | Sameera Ghayyur | Shafay Shamail
[1] Radu Calinescu,et al. Dynamic QoS Management and Optimization in Service-Based Systems , 2011, IEEE Transactions on Software Engineering.
[2] Ashwin Machanavajjhala,et al. No free lunch in data privacy , 2011, SIGMOD '11.
[3] Tao Yu,et al. Efficient algorithms for Web services selection with end-to-end QoS constraints , 2007, TWEB.
[4] Vijayalakshmi Atluri,et al. Dynamic Composition of Workflows for Customized eGovernment Service Delivery , 2002, DG.O.
[5] Wil M. P. van der Aalst,et al. Beyond Process Mining: From the Past to Present and Future , 2010, CAiSE.
[6] Benjamin C. M. Fung,et al. Differentially private transit data publication: a case study on the montreal transportation system , 2012, KDD.
[7] Mikhail J. Atallah,et al. Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS , 2012, Cloud-I '12.
[8] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[9] Wil M. P. van der Aalst,et al. Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.
[10] Huayu Zhang,et al. Social Software for Coordination of Collaborative Process Activities , 2010, Business Process Management Workshops.
[11] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[12] Luciano Baresi,et al. Self-Supervising BPEL Processes , 2011, IEEE Transactions on Software Engineering.
[13] Michael Prilla,et al. Key challenges for enabling agile BPM with social software , 2011, J. Softw. Maintenance Res. Pract..
[14] Francisco Curbera,et al. Web Services Business Process Execution Language Version 2.0 , 2007 .
[15] Hui Xiong,et al. Semantics-Based Automated Service Discovery , 2012, IEEE Transactions on Services Computing.
[16] Ricardo Bezerra de Andrade e Silva,et al. Probabilistic workflow mining , 2005, KDD '05.
[17] Mikhail J. Atallah,et al. Privacy-Preserving Business Process Outsourcing , 2012, 2012 IEEE 19th International Conference on Web Services.
[18] Sherif Sakr,et al. Design by Selection: A Reuse-Based Approach for Business Process Modeling , 2011, ER.
[19] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[20] Marco Brambilla,et al. BPMN and Design Patterns for Engineering Social BPM Solutions , 2011, Business Process Management Workshops.
[21] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[22] Hajo A. Reijers,et al. Social software for business process modeling , 2010, J. Inf. Technol..
[23] Vijayalakshmi Atluri,et al. Using Semantics for Policy-Based Web Service Composition , 2005, Distributed and Parallel Databases.
[24] Jianmin Wang,et al. A novel approach for process mining based on event types , 2007, IEEE International Conference on Services Computing (SCC 2007).
[25] Vijayalakshmi Atluri,et al. Domain Knowledge-Based Automatic Workflow Generation , 2002, DEXA.
[26] Florian Kerschbaum,et al. Security against the business partner , 2008, SWS '08.
[27] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[28] Schahram Dustdar,et al. Non-intrusive monitoring and service adaptation for WS-BPEL , 2008, WWW.