A Logic-Based Methodology for Business Process Analysis and Design: Linking Business Policies to Workflow Models
暂无分享,去创建一个
[1] Sudha Ram,et al. SEAM: A State-Entity-Activity-Model for a Well-Defined Workflow Development Methodology , 2002, IEEE Trans. Knowl. Data Eng..
[2] Thomas Peltier. Information Security: Policies and Procedures: A Practitioner's Reference , 1998 .
[3] Mark Klein,et al. Introduction to the Special Issue on Adaptive Workflow Systems , 2000, Computer Supported Cooperative Work (CSCW).
[4] M. Hammer,et al. Reengineering the Corporation , 1993 .
[5] Roshan K. Thomas,et al. Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments , 1997, RBAC '97.
[6] Ritu Agarwal,et al. Formal validation of a knowledge-based system using a variation of the Turing test , 1993 .
[7] Akhil Kumar,et al. Organizational modeling in UML and XML in the context of workflow systems , 2003, SAC '03.
[8] Robin J. Wilson. Introduction to Graph Theory , 1974 .
[9] David Geer,et al. Taking Steps to Secure Web Services , 2003, Computer.
[10] Charles G. Cobb. Enterprise Process Mapping: Integrating Systems For Compliance And Business Excellence , 2004 .
[11] Maria E. Orlowska,et al. Data Flow and Validation in Workflow Modelling , 2004, ADC.
[12] Jay F. Nunamaker. A methodology for the design and optimization of information processing systems , 1899 .
[13] Maria E. Orlowska,et al. Modeling and Verification of Workflow Graphs , 1996 .
[14] Robert W. Blanning,et al. Metagraphs: a tool for modeling decision support systems , 1994 .
[15] Vijayalakshmi Atluri,et al. An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment , 1996, DBSec.
[16] Daniel Teichroew. Problem Statement Languages in MIS , 1971 .
[17] J. Bloem,et al. Making IT Governance Work in a Sarbanes-Oxley World , 2005 .
[18] Vijayalakshmi Atluri,et al. Enforcing Mandatory and Discretionary Security in Workflow Management Systems , 1997, J. Comput. Secur..
[19] Benjamin N. Grosof,et al. SweetDeal : Represen with Exceptions using and Process , 2003 .
[20] William J. Kettinger,et al. Business Process Change: A Study of Methodologies, Techniques, and Tools , 1997, MIS Q..
[21] Silvana Castano,et al. Managing Workflow Authorization Constraints through Active Database Technology , 2001, Inf. Syst. Frontiers.
[22] P. R. Balasubramanian,et al. Adding workflow analysis techniques to the IS development toolkit , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[23] Wil M. P. van der Aalst,et al. Verification of Workflow Nets , 1997, ICATPN.
[24] M. Z. Muehlen. Evaluation of Workflow Management Systems using Meta Models , 1999, HICSS.
[25] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[26] Vijayalakshmi Atluri,et al. An Authorization Model for Workflows , 1996, ESORICS.
[27] Jae Kyu Lee,et al. The eXtensible Rule Markup Language , 2003, CACM.
[28] Fabio Casati,et al. Specification and implementation of exceptions in workflow management systems , 1999, TODS.
[29] Michael zur Muehlen,et al. Organizational Management in Workflow Applications - Issues and Perspectives , 2004, Inf. Technol. Manag..
[30] Mathias Weske,et al. A reference model for workflow application development processes , 1999, WACC '99.
[31] Wil M. P. van der Aalst,et al. Workflow Patterns , 2004, Distributed and Parallel Databases.
[32] Robert W. Blanning,et al. A Formal Approach to Workflow Analysis , 2000, Inf. Syst. Res..
[33] Wil M. P. van der Aalst,et al. Workflow Resource Patterns: Identification, Representation and Tool Support , 2005, CAiSE.
[34] Wil M. P. van der Aalst,et al. Verification Of Workflow Task Structures: A Petri-net-baset Approach , 2000, Inf. Syst..
[35] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[36] Akhil Kumar,et al. Research Commentary: Workflow Management Issues in e-Business , 2002, Inf. Syst. Res..
[37] Vijayalakshmi Atluri,et al. Analysing the Safety of Workflow Authorization Models , 1998, DBSec.
[38] Richard J. Mayer,et al. Information Integration for Concurrent Engineering (IICE) IDEF3 Process Description Capture Method Report , 1992 .
[39] Maria E. Orlowska,et al. Managing Change and Time in Dynamic Workflow Processes , 2000, Int. J. Cooperative Inf. Syst..
[40] Benjamin N. Grosof,et al. Representing E-Business Rules for the Semantic Web: Situated Courteous Logic Programs in RuleML , 2001 .
[41] Robert W. Blanning,et al. Synthesis and Decomposition of Processes in Organizations , 2003, Inf. Syst. Res..
[42] Henry H. Bi,et al. Mending the Lag between Commercial Needs and Research Prototypes: A Logic-Based Workflow Verification Approach , 2003 .
[43] F. Caeldries. Reengineering the Corporation: A Manifesto for Business Revolution , 1994 .
[44] Henry H. Bi,et al. Applying Propositional Logic to Workflow Verification , 2004, Inf. Technol. Manag..
[45] Hajo A. Reijers,et al. Product-Based Workflow Design , 2003, J. Manag. Inf. Syst..
[46] Leon Sterling,et al. The art of Prolog (2nd ed.): advanced programming techniques , 1994 .
[47] Silvana Castano,et al. Using Patterns to Design Rules in Workflows , 2000, IEEE Trans. Software Eng..
[48] C. R. Ramakrishnan,et al. Logic based modeling and analysis of workflows , 1998, PODS '98.
[49] Elisa Bertino,et al. A Semantic-Based Execution Model for Multilevel Secure Workflows , 2000, J. Comput. Secur..
[50] Peter Dadam,et al. Evaluation of Correctness Criteria for Dynamic Workflow Changes , 2003, Business Process Management.
[51] August-Wilhelm Scheer,et al. ARIS - Business Process Modeling , 1998 .
[52] V. Daniel Hunt,et al. Process Mapping: How to Reengineer Your Business Processes , 1996 .
[53] Silvana Castano,et al. Enforcing Workflow Authorization Constraints Using Triggers , 1998, J. Comput. Secur..
[54] Michael zur Muehlen,et al. Resource Modeling in Workflow Applications , 1999 .
[55] Frank Leymann,et al. Web services and business process management , 2002, IBM Syst. J..
[56] Wil M. P. van der Aalst,et al. The Application of Petri Nets to Workflow Management , 1998, J. Circuits Syst. Comput..
[57] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[58] Mohan Tanniru,et al. Information System Verification and Validation during Requirement Analysis Using Petri Nets , 1989, J. Manag. Inf. Syst..
[59] Manfred Reichert,et al. Adeptflex—Supporting Dynamic Changes of Workflows Without Losing Control , 1998, Journal of Intelligent Information Systems.
[60] C. Peltz. Web Ser Vices Orchestration a Review of Emerging Technologies, Tools, and Standards , 2003 .
[61] Vijayalakshmi Atluri,et al. Modeling and Analysis of Workflows Using Petri Nets , 1998, Journal of Intelligent Information Systems.
[62] Mark Klein,et al. A Knowledge-based Approach to Handling Exceptions in Workflow Systems , 2011, Computer Supported Cooperative Work (CSCW).
[63] Rudolf Vetschera,et al. Algorithmical approaches to business process design , 2001, Comput. Oper. Res..
[64] Anindya Datta,et al. Automating the Discovery of AS-IS Business Process Models: Probabilistic and Algorithmic Approaches , 1998, Inf. Syst. Res..
[65] Ravi S. Sandhu,et al. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management , 1997, DBSec.
[66] August-Wilhelm Scheer,et al. ARIS - Business Process Frameworks , 1998 .
[67] Christoph Bussler,et al. Workflow Management: Modeling Concepts, Architecture and Implementation , 1996 .
[68] Bill Curtis,et al. Process modeling , 1992, CACM.
[69] Wil M. P. van der Aalst,et al. Exterminating the Dynamic Change Bug: A Concrete Approach to Support Workflow Change , 2001, Inf. Syst. Frontiers.
[70] Ernest A. Hershey,et al. PSL/PSA: A Computer-Aided Technique for Structured Documentation and Analysis of Information Processing Systems , 1976, IEEE Transactions on Software Engineering.
[71] Tariq Aldowaisan,et al. Business process reengineering: an approach for process mapping , 1999 .
[72] Olivia R. Liu Sheng,et al. Data Flow Modeling and Verification in Business Process Management , 2004, AMCIS.
[73] J. Leon Zhao,et al. Workflow Automation: Overview and Research Issues , 2001, Inf. Syst. Frontiers.
[74] Ernest Friedman. Jess in action: rule-based systems in java , 2003 .
[75] D. West. Introduction to Graph Theory , 1995 .
[76] Tony Andrews. Business Process Execution Language for Web Services Version 1.1 , 2003 .
[77] Clarence A. Ellis,et al. ML-DEWS: Modeling Language to Support Dynamic Evolution within Workflow Systems , 2000, Computer Supported Cooperative Work (CSCW).
[78] Robert W. Blanning,et al. Metagraphs in workflow support systems , 1999, Decis. Support Syst..
[79] Dickson K. W. Chiu,et al. A Meta Modeling Approach to Workflow Management Systems Supporting Exception Handling , 1999, Inf. Syst..
[80] Martin Naedele. Standards for XML and Web Services Security , 2003, Computer.
[81] William L. Oellermann. Architecting Web Services , 2001, Apress.
[82] Wil M. P. van der Aalst,et al. Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques , 2000, Business Process Management.
[83] Ritu Agarwal,et al. Knowledge-based approach to structural integrity verification in requirements analysis and logical system specification , 1993, Knowl. Based Syst..
[84] Richard N. Taylor,et al. Techniques for Supporting Dynamic and Adaptive Workflow , 2000, Computer Supported Cooperative Work (CSCW).
[85] Wil M. P. van der Aalst,et al. Re-engineering knock-out processes , 2001, Decis. Support Syst..
[86] Saikat Mukherjee,et al. Logic Based Approaches to Workflow Modeling and Verification , 2003, Logics for Emerging Applications of Databases.
[87] Shengli Wu,et al. Authorization and Access Control of Application Data in Workflow Systems , 2004, Journal of Intelligent Information Systems.
[88] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[89] Grzegorz Rozenberg,et al. Dynamic change within workflow systems , 1995, COCS '95.
[90] Marlon Dumas,et al. Pattern Based Analysis of BPEL4WS , 2002 .
[91] Henry H. Bi,et al. Process Logic for Verifying the Correctness of Business Process Models , 2004, ICIS.
[92] Padhraic Smyth,et al. Analysis and Visualization of Network Data using JUNG , 2005 .