Business Process Management Workshops

Although the development and expansion for the time-based RBAC policy has enhanced the security greatly, there are hardly any paper paying attention to the conflicts that produced by the time feature in multi-domain RBAC model. In this paper, we focus on temporal constraints and the role inheritance constraints that occurred in the interoperation domains based on Petri nets. The approach can check whether an inter-domain access requirement has violated its local RBAC policy or the inter-domain access control policy has improper temporal constraints. In order to illustrate this approach, an applicable example is shown for the specification and conflict detection. This work was financially supported by National Natural Science Foundation of China with Grants No. 61370216, No. 11071271, No. 11371004 and No. 61100191, and Shenzhen Strategic Emerging Industries Program with Grants No. ZDSY20120613125016389, No. JCYJ20120613151201451 and No. JCYJ20130329153215152. And also Natural Scientific Research Innovation Foundation in Harbin Institute of Technology under project HIT.NSFIR.2011128. Keynote: Information Visualization Optimization Applied to Process Mining Emiliano ‘‘Max’’ Martinez Rivera and Hajo A. Reijers 1 Perceptive Software, Research and Development, Piet Joubertstraat 4, Apeldoorn, The Netherlands {emiliano.martinezrivera, hajo.reijers}@perceptivesoftware.com 2 Eindhoven University of Technology, Department of Mathematics and Computer Science, Den Dolech 2, Eindhoven, The Netherlands

[1]  Martin Peterson,et al.  An Introduction to Decision Theory , 2009 .

[2]  Bernard Grabot,et al.  Adding decision support to workflow systems by reusable standard software components , 2002, Comput. Ind..

[3]  Manfred Reichert,et al.  Efficacy-Aware Business Process Modeling , 2012, OTM Conferences.

[4]  Yuzhong Qu,et al.  Constructing virtual documents for ontology matching , 2006, WWW '06.

[5]  Norman W. Paton,et al.  User Feedback as a First Class Citizen in Information Integration Systems , 2011, CIDR.

[6]  Frank Leymann,et al.  Monitoring and Analyzing Influential Factors of Business Process Performance , 2009, 2009 IEEE International Enterprise Distributed Object Computing Conference.

[7]  Stefanie Rinderle-Ma,et al.  Towards Compliance of Cross-Organizational Processes and Their Changes - Research Challenges and State of Research , 2012, Business Process Management Workshops.

[8]  Peter Stahlecker,et al.  The Minimax, the Minimin, and the Hurwicz Adjustment Principle , 2002 .

[9]  Manfred Reichert,et al.  Enabling Flexibility in Process-Aware Information Systems , 2012, Springer Berlin Heidelberg.

[10]  R. Hogarth,et al.  BEHAVIORAL DECISION THEORY: PROCESSES OF JUDGMENT AND CHOICE , 1981 .

[11]  James H. Lambert,et al.  RISK OF EXTREME EVENTS IN A MULTIOBJECTIVE FRAMEWORK , 1992 .

[12]  A. Dixit Entry and Exit Decisions under Uncertainty , 1989, Journal of Political Economy.

[13]  Manfred Reichert,et al.  Modeling Business Objectives for Business Process Management , 2012, S-BPM ONE.

[14]  Wil M. P. van der Aalst,et al.  Process Mining - Discovery, Conformance and Enhancement of Business Processes , 2011 .

[15]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[16]  Remco M. Dijkman,et al.  The ICoP Framework: Identification of Correspondences between Process Models , 2010, CAiSE.

[17]  James M. Joyce The Foundations of Causal Decision Theory , 1999 .

[18]  Karl Aberer,et al.  Minimizing Human Effort in Reconciling Match Networks , 2013, ER.

[19]  Mathias Weske,et al.  Efficient Consistency Measurement Based on Behavioral Profiles of Process Models , 2011, IEEE Transactions on Software Engineering.

[20]  Wilhelm Rödder,et al.  A consensual peer-based DEA-model with optimized cross-efficiencies - Input allocation instead of radial reduction , 2011, Eur. J. Oper. Res..

[21]  van der Wmp Wil Aalst,et al.  Mining CPN models: discovering process models with data from event logs , 2006 .

[22]  Manfred Reichert,et al.  Adeptflex—Supporting Dynamic Changes of Workflows Without Losing Control , 1998, Journal of Intelligent Information Systems.

[23]  Avigdor Gal,et al.  Schema matching prediction with applications to data source discovery and dynamic ensembling , 2013, The VLDB Journal.

[24]  Hajo A. Reijers,et al.  Product Based Workflow Support: Dynamic Workflow Execution , 2008, CAiSE.

[25]  Zdzislaw Pawlak,et al.  Decision Rules, Bayes' Rule and Ruogh Sets , 1999, RSFDGrC.

[26]  Avigdor Gal,et al.  Non-binary Evaluation for Schema Matching , 2012, ER.

[27]  Boudewijn F. van Dongen,et al.  Supporting Flexible Processes through Recommendations Based on History , 2008, BPM.

[28]  Richard Gonzalez,et al.  Decision under Risk , 2004 .

[29]  Jana Koehler,et al.  The refined process structure tree , 2008, Data Knowl. Eng..

[30]  Moe Thandar Wynn,et al.  Workflow simulation for operational decision support , 2009, Data Knowl. Eng..

[31]  Manfred Reichert,et al.  Ensuring business process compliance along the process life cycle , 2012 .

[32]  Matthias Weidlich,et al.  Towards a Compendium of Process Technologies - The jBPT Library for Process Model Analysis , 2013, CAiSE Forum.

[33]  Wil M. P. van der Aalst,et al.  Semantic Process Mining Tools: Core Building Blocks , 2008, ECIS.

[34]  Nabil A. Kartam,et al.  Robust contingency plans for transportation investment planning , 1993, IEEE Trans. Syst. Man Cybern..

[35]  Srinivas Peeta,et al.  A Hybrid Model for Driver Route Choice Incorporating En-Route Attributes and Real-Time Information Effects , 2003 .

[36]  Michael zur Muehlen,et al.  Business Process Analytics , 2015, Handbook on Business Process Management.