Toward Resilience Assessment in Business Process Architectures
暂无分享,去创建一个
[1] Katinka Wolter,et al. Resilience Assessment and Evaluation of Computing Systems , 2012 .
[2] Boudewijn F. van Dongen,et al. Cycle Time Prediction: When Will This Case Finally Be Finished? , 2008, OTM Conferences.
[3] Wil M. P. van der Aalst,et al. Time prediction based on process mining , 2011, Inf. Syst..
[4] Günter Müller,et al. Resilience - A New Research Field in Business Information Systems? , 2013, BIS.
[5] David Woods,et al. Resilience Engineering: Concepts and Precepts , 2006 .
[6] Johann Eder,et al. Time Management in Workflow Systems , 1999, BIS.
[7] Stefan Fenz,et al. FORISK: Formalizing information security risk and compliance management , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
[8] Michel Bruneau,et al. A Framework to Quantitatively Assess and Enhance the Seismic Resilience of Communities , 2003 .
[9] Johann Eder,et al. ePERT: Extending PERT for Workflow Management Systems , 1997 .
[10] Per Runeson,et al. Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.
[11] Jeffrey J. P. Tsai,et al. Timing Constraint Petri Nets and Their Application to Schedulability Analysis of Real-Time System Specifications , 1995, IEEE Trans. Software Eng..
[12] Rafael Accorsi,et al. Security and Trust Management , 2013, Lecture Notes in Computer Science.
[13] Brian S. Butler,et al. Reliability, Mindfulness, and Information Systems , 2006, MIS Q..
[14] Vijayalakshmi Atluri,et al. Security for Workflow Systems , 2001, Inf. Secur. Tech. Rep..
[15] Witold Abramowicz. Business Information Systems Workshops , 2014, Lecture Notes in Business Information Processing.
[16] Wil M. P. van der Aalst,et al. Process Mining - Discovery, Conformance and Enhancement of Business Processes , 2011 .
[17] C. Ramchandani,et al. Analysis of asynchronous concurrent systems by timed petri nets , 1974 .
[18] Christian Zimmermann,et al. Towards a Detective Approach to Process-Centered Resilience , 2013, STM.
[19] Moe Thandar Wynn,et al. Profiling Event Logs to Configure Risk Indicators for Process Delays , 2013, CAiSE.
[20] Pedro Antunes,et al. Resilient Business Process Management: Framework and services , 2011, Expert Syst. Appl..
[21] Günter Müller,et al. On the exploitation of process mining for security audits: the process discovery case , 2013, SAC '13.