-
2
-
-
34147190948
-
Business process mining: An industrial application
-
DOI 10.1016/j.is.2006.05.003, PII S0306437906000305
-
W.M.P. van der Aalst, H.A. Reijers, A.J.M.M. Weijters, B.F. van Dongen, A.K.A. de Medeiros, M. Song, and H.M.W.E. Verbeek Business process mining: an industrial application Inf. Syst. 32 5 2007 713 732 (Pubitemid 46560274)
-
(2007)
Information Systems
, vol.32
, Issue.5
, pp. 713-732
-
-
Van Der Aalst, W.M.P.1
Reijers, H.A.2
Weijters, A.J.M.M.3
Van Dongen, B.F.4
Alves De Medeiros, A.K.5
Song, M.6
Verbeek, H.M.W.7
-
3
-
-
84890470685
-
Mining Process Models from Workflow Logs
-
Advances in Database Technology - EDDT'98
-
R. Agrawal, D. Gunopulos, and F. Leymann Mining process models from workflow logs H.-J. Schek, F. Saltor, I. Ramos, G. Alonso, EDBT, Lecture Notes in Computer Science vol. 1377 1998 Springer 469 483 (Pubitemid 128044768)
-
(1998)
Lecture Notes in Computer Science
, Issue.1377
, pp. 469-483
-
-
Agrawal, R.1
Gunopulos, D.2
Leymann, F.3
-
4
-
-
0242712942
-
Workflow mining: Current status and future directions
-
A.K.A. de Medeiros, W.M.P. van der Aalst, and A.J.M.M. Weijters Workflow mining: Current status and future directions R. Meersman, Z. Tari, D.C. Schmidt, CoopIS/DOA/ODBASE, Lecture Notes in Computer Science vol. 2888 2003 Springer 389 406
-
(2003)
CoopIS/DOA/ODBASE, Lecture Notes in Computer Science
, vol.2888
, pp. 389-406
-
-
De Medeiros, A.K.A.1
Van Der Aalst, W.M.P.2
Weijters, A.J.M.M.3
-
5
-
-
0032328790
-
Automating the discovery of as-is business process models: Probabilistic and algorithmic approaches
-
A. Datta Automating the discovery of as-is business process models: probabilistic and algorithmic approaches Inf. Syst. Res. 9 3 1998 275 301
-
(1998)
Inf. Syst. Res.
, vol.9
, Issue.3
, pp. 275-301
-
-
Datta, A.1
-
6
-
-
40549125625
-
The need for a process mining evaluation framework in research and practice
-
A. Rozinat, A.K.A. de Medeiros, C.W. Günther, A.J.M.M. Weijters, and W.M.P. van der Aalst The need for a process mining evaluation framework in research and practice A.H.M. ter Hofstede, B. Benatallah, H.-Y. Paik, Business Process Management Workshops, Lecture Notes in Computer Science vol. 4928 2007 Springer 84 89
-
(2007)
Business Process Management Workshops, Lecture Notes in Computer Science
, vol.4928
, pp. 84-89
-
-
Rozinat, A.1
De Medeiros, A.K.A.2
Günther, C.W.3
Weijters, A.J.M.M.4
Van Der Aalst, W.M.P.5
-
7
-
-
79958104249
-
A critical evaluation study of model-log metrics in process discovery
-
Hoboken, NJ, USA
-
J.D. Weerdt, M.D. Backer, J. Vanthienen, B. Baesens, A critical evaluation study of model-log metrics in process discovery, in: Proceedings of the 6th International Workshop on Business Process Intelligence (BPI 2010), Hoboken, NJ, USA, 2010.
-
(2010)
Proceedings of the 6th International Workshop on Business Process Intelligence (BPI 2010)
-
-
Weerdt, J.D.1
Backer, M.D.2
Vanthienen, J.3
Baesens, B.4
-
8
-
-
72549107971
-
Process mining: A two-step approach to balance between underfitting and overfitting
-
W. van der Aalst, V. Rubin, B. van Dongen, E. Kindler, and C. Günther Process mining: a two-step approach to balance between underfitting and overfitting Software Syst. Model. 9 2010 87 111
-
(2010)
Software Syst. Model.
, vol.9
, pp. 87-111
-
-
Van Der Aalst, W.1
Rubin, V.2
Van Dongen, B.3
Kindler, E.4
Günther, C.5
-
9
-
-
35748949584
-
Conformance checking of processes based on monitoring real behavior
-
DOI 10.1016/j.is.2007.07.001, PII S030643790700049X
-
A. Rozinat, and W.M.P. van der Aalst Conformance checking of processes based on monitoring real behavior Inf. Syst. 33 1 2008 64 95 (Pubitemid 350051578)
-
(2008)
Information Systems
, vol.33
, Issue.1
, pp. 64-95
-
-
Rozinat, A.1
Van Der Aalst, W.M.P.2
-
10
-
-
36049031472
-
Quantifying process equivalence based on observed behavior
-
DOI 10.1016/j.datak.2007.06.010, PII S0169023X07001206, Fourth International Conference on Business Process Management (BPM 2006) Four selected and extended papers
-
A.K.A. de Medeiros, W.M.P. van der Aalst, and A.J.M.M. Weijters Quantifying process equivalence based on observed behavior Data Knowl. Eng. 64 1 2008 55 74 (Pubitemid 350087285)
-
(2008)
Data and Knowledge Engineering
, vol.64
, Issue.1
, pp. 55-74
-
-
Alves De Medeiros, A.K.1
Van Der Aalst, W.M.P.2
Weijters, A.J.M.M.3
-
11
-
-
40549143268
-
-
BETA Working Paper Series WP 166, Eindhoven University of Technology, Eindhoven
-
A. Weijters, W. van der Aalst, A.A. de Medeiros, Process mining with the heuristicsminer algorithm, BETA Working Paper Series WP 166, Eindhoven University of Technology, Eindhoven, 2006.
-
(2006)
Process Mining with the Heuristicsminer Algorithm
-
-
Weijters, A.1
Aalst Der W.Van2
De Medeiros, A.A.3
-
12
-
-
33746334454
-
Discovering expressive process models by clustering log traces
-
DOI 10.1109/TKDE.2006.123, 1644726
-
G. Greco, A. Guzzo, L. Pontieri, and D. Saccà Discovering expressive process models by clustering log traces IEEE Trans. Knowl. Data Eng. 18 8 2006 1010 1027 (Pubitemid 44109532)
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.8
, pp. 1010-1027
-
-
Greco, G.1
Guzzo, A.2
Pontieri, L.3
Sacca, D.4
-
15
-
-
0000974483
-
The state explosion problem
-
A. Valmari The state explosion problem W. Reisig, G. Rozenberg, Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, the volumes are based on the Advanced Course on Petri Nets, held in Dagstuhl, September 1996, Lecture Notes in Computer Science vol. 1491 1998 Springer 429 528
-
(1998)
Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, the Volumes Are Based on the Advanced Course on Petri Nets, Held in Dagstuhl, September 1996, Lecture Notes in Computer Science
, vol.1491
, pp. 429-528
-
-
Valmari, A.1
-
17
-
-
78650727662
-
Measuring the compliance of processes with reference models
-
K. Gerke, J. Cardoso, and A. Claus Measuring the compliance of processes with reference models R. Meersman, T.S. Dillon, P. Herrero, OTM Conferences (1), Lecture Notes in Computer Science vol. 5870 2009 Springer 76 93
-
(2009)
OTM Conferences (1), Lecture Notes in Computer Science
, vol.5870
, pp. 76-93
-
-
Gerke, K.1
Cardoso, J.2
Claus, A.3
-
18
-
-
79957803658
-
Efficient consistency measurement based on behavioural profiles of process models
-
18 October 2010. IEEE computer Society Digital Library, IEEE Computer Society
-
M. Weidlich, J. Mendling, M. Weske, Efficient consistency measurement based on behavioural profiles of process models, IEEE Transactions on Software Engineering, 18 October 2010. IEEE computer Society Digital Library, IEEE Computer Society, 〈 http://doi.ieeecomputersociety.org/10.1109/TSE.2010.96 〉
-
IEEE Transactions on Software Engineering
-
-
Weidlich, M.1
Mendling, J.2
Weske, M.3
-
19
-
-
77955356972
-
Efficient computation of causal behavioural profiles using structural decomposition
-
M. Weidlich, A. Polyvyanyy, J. Mendling, and M. Weske Efficient computation of causal behavioural profiles using structural decomposition J. Lilius, W. Penczek, Petri Nets, Lecture Notes in Computer Science vol. 6128 2010 Springer 63 83
-
(2010)
Petri Nets, Lecture Notes in Computer Science
, vol.6128
, pp. 63-83
-
-
Weidlich, M.1
Polyvyanyy, A.2
Mendling, J.3
Weske, M.4
-
20
-
-
79956309008
-
Process compliance measurement based on behavioural profiles
-
M. Weidlich, A. Polyvyanyy, N. Desai, and J. Mendling Process compliance measurement based on behavioural profiles B. Pernici, CAiSE, Lecture Notes in Computer Science vol. 6051 2010 Springer 499 514
-
(2010)
CAiSE, Lecture Notes in Computer Science
, vol.6051
, pp. 499-514
-
-
Weidlich, M.1
Polyvyanyy, A.2
Desai, N.3
Mendling, J.4
-
21
-
-
0345903651
-
Atomicity and Isolation for Transactional Processes
-
DOI 10.1145/507234.507236
-
H. Schuldt, G. Alonso, C. Beeri, and H.-J. Schek Atomicity and isolation for transactional processes ACM Trans. Database Syst. 27 1 2002 63 116 (Pubitemid 135702892)
-
(2002)
ACM Transactions on Database Systems
, vol.27
, Issue.1
, pp. 63-116
-
-
Schuldt, H.1
Alonso, G.2
Beeri, C.3
Schek, H.-J.4
-
22
-
-
0028396177
-
Understanding quality in conceptual modeling
-
O.I. Lindland, G. Sindre, and A. Sølvberg Understanding quality in conceptual modeling IEEE Software 11 2 1994 42 49
-
(1994)
IEEE Software
, vol.11
, Issue.2
, pp. 42-49
-
-
Lindland, O.I.1
Sindre, G.2
Sølvberg, A.3
-
23
-
-
58049114816
-
Automatic workflow graph refactoring and completion
-
J. Vanhatalo, H. Völzer, F. Leymann, and S. Moser Automatic workflow graph refactoring and completion A. Bouguettaya, I. Krüger, T. Margaria, ICSOC, Lecture Notes in Computer Science vol. 5364 2008 100 115
-
(2008)
ICSOC, Lecture Notes in Computer Science
, vol.5364
, pp. 100-115
-
-
Vanhatalo, J.1
Völzer, H.2
Leymann, F.3
Moser, S.4
-
24
-
-
0002307971
-
Workflow verification: Finding control-flow errors using petri-net-based techniques
-
W.M.P. van der Aalst Workflow verification: finding control-flow errors using petri-net-based techniques W.M.P. van der Aalst, J. Desel, A. Oberweis, Business Process Management, Lecture Notes in Computer Science vol. 1806 2000 Springer 161 183
-
(2000)
Business Process Management, Lecture Notes in Computer Science
, vol.1806
, pp. 161-183
-
-
Van Der Aalst, W.M.P.1
-
26
-
-
79953087972
-
Generalised computation of behavioural profiles based on petri-net unfoldings
-
M. Weidlich, F. Elliger, M. Weske, Generalised computation of behavioural profiles based on petri-net unfoldings, Web Services and Formal Methods Lecture Notes in Computer Science 6551 (2011), 101115, doi:10.1007/978-3-642-19589-1-7
-
(2011)
Web Services and Formal Methods Lecture Notes in Computer Science
, vol.6551
, pp. 101-115
-
-
Weidlich, M.1
Elliger, F.2
Weske, M.3
-
27
-
-
0038002768
-
Rediscovering workflow models from event-based data using little thumb
-
A. Weijters, and W. van der Aalst Rediscovering workflow models from event-based data using little thumb Integrated Comput. Aided Eng. 10 2 2003 151 162
-
(2003)
Integrated Comput. Aided Eng.
, vol.10
, Issue.2
, pp. 151-162
-
-
Weijters, A.1
Van Der Aalst, W.2
-
29
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
R. Agrawal, T. Imielinski, and A.N. Swami Mining association rules between sets of items in large databases P. Buneman, S. Jajodia, SIGMOD Conference 1993 ACM Press 207 216
-
(1993)
SIGMOD Conference
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.N.3
-
30
-
-
0002221136
-
Fast algorithms for mining association rules in large databases
-
R. Agrawal, and R. Srikant Fast algorithms for mining association rules in large databases J.B. Bocca, M. Jarke, C. Zaniolo, VLDB 1994 Morgan Kaufmann 487 499
-
(1994)
VLDB
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
31
-
-
85014307869
-
Algorithmic aspects of vertex elimination
-
New Mexico, United States
-
D.J. Rose, R.E. Tarjan, Algorithmic aspects of vertex elimination, in: Proceedings of 7th Annual ACM Symposium on Theory of Computing, Albuquerque, New Mexico, United States, 1975, pp. 245254.
-
(1975)
Proceedings of 7th Annual ACM Symposium on Theory of Computing, Albuquerque
, pp. 245-254
-
-
Rose, D.J.1
Tarjan, R.E.2
-
32
-
-
84900422142
-
Supporting process mining by showing events at a glance
-
K. Chari, A. Kumar (Eds.) Montreal, Canada
-
M. Song, W. van der Aalst, Supporting process mining by showing events at a glance, in: K. Chari, A. Kumar (Eds.), Proceedings of 17th Annual Workshop on Information Technologies and Systems (WITS 2007), Montreal, Canada, 2007, pp. 139145.
-
(2007)
Proceedings of 17th Annual Workshop on Information Technologies and Systems (WITS 2007)
, pp. 139-145
-
-
Song, M.1
Aalst Der W.Van2
-
33
-
-
78049275801
-
Trace alignment in process mining: Opportunities for process diagnostics
-
R.P.J.C. Bose, and W.M.P. van der Aalst Trace alignment in process mining: opportunities for process diagnostics R. Hull, J. Mendling, S. Tai, BPM, Lecture Notes in Computer Science vol. 6336 2010 Springer 227 242
-
(2010)
BPM, Lecture Notes in Computer Science
, vol.6336
, pp. 227-242
-
-
Bose, R.P.J.C.1
Van Der Aalst, W.M.P.2
-
34
-
-
57049146832
-
Detecting and resolving process model differences in the absence of a change log
-
M. Dumas, M. Reichert, M.-C. Shan (Eds.) Milan, Italy, September 2-4, 2008, Lecture Notes in Computer Science, vol. 5240, Springer, 2008
-
J.M. Küster, C. Gerth, A. Förster, G. Engels, Detecting and resolving process model differences in the absence of a change log, in: M. Dumas, M. Reichert, M.-C. Shan (Eds.), Business Process Management, Proceedings of the 6th International Conference, BPM 2008, Milan, Italy, September 24, 2008, Lecture Notes in Computer Science, vol. 5240, Springer, 2008, pp. 244260.
-
Business Process Management, Proceedings of the 6th International Conference, BPM 2008
, pp. 244-260
-
-
Küster, J.M.1
-
35
-
-
57049179525
-
Diagnosing differences between business process models
-
M. Dumas, M. Reichert, M.-C. Shan (Eds.) Milan, Italy, September 2-4, 2008, Lecture Notes in Computer Science, vol. 5240, Springer, 2008
-
R.M. Dijkman, Diagnosing differences between business process models, in: M. Dumas, M. Reichert, M.-C. Shan (Eds.), Business Process Management, Proceedings of the 6th International Conference, BPM 2008, Milan, Italy, September 24, 2008, Lecture Notes in Computer Science, vol. 5240, Springer, 2008, pp. 261277.
-
Business Process Management, Proceedings of the 6th International Conference, BPM 2008
, pp. 261-277
-
-
Dijkman, R.M.1
-
36
-
-
0035584844
-
Refinement of actions and equivalence notions for concurrent systems
-
DOI 10.1007/s002360000041
-
R. Glabbeek, and U. Goltz Refinement of actions and equivalence notions for concurrent systems Acta Inf. 37 4/5 2001 229 327 (Pubitemid 33588635)
-
(2001)
Acta Informatica
, vol.37
, Issue.4-5
, pp. 229-327
-
-
Van Glabbeek, R.1
Goltz, U.2
-
37
-
-
84864009698
-
When are two workflows the same?
-
J. Hidders, M. Dumas, W. Aalst, A. Hofstede, and J. Verelst When are two workflows the same? M.D. Atkinson, F.K.H.A. Dehne, CATS, CRPIT vol. 41 2005 Australian Computer Society 3 11
-
(2005)
CATS, CRPIT
, vol.41
, pp. 3-11
-
-
Hidders, J.1
Dumas, M.2
Aalst, W.3
Hofstede, A.4
Verelst, J.5
-
39
-
-
2442606048
-
Observable or Invocable Behaviour - You Have to Choose
-
Leiden University, December
-
J. Ebert, G. Engels, Observable or Invocable Behaviour - You Have to Choose, Technical Report 94-38, Department of Computer Science, Leiden University, December 1994.
-
(1994)
Technical Report 94-38, Department of Computer Science
-
-
Ebert, J.1
Engels, G.2
-
40
-
-
1542430430
-
Behavior-consistent specialization of object life cycles
-
M. Schrefl, and M. Stumptner Behavior-consistent specialization of object life cycles ACM Trans. Software Eng. Methodol. 11 1 2002 92 148
-
(2002)
ACM Trans. Software Eng. Methodol.
, vol.11
, Issue.1
, pp. 92-148
-
-
Schrefl, M.1
Stumptner, M.2
-
41
-
-
33845396749
-
Evaluation of technical measures for workflow similarity based on a pilot study
-
On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE - OTM Confederated International Conferences, CoopIS, DOA, GADA, and ODBASE 2006, Proceedings
-
A. Wombacher Evaluation of technical measures for workflow similarity based on a pilot study R. Meersman, Z. Tari, OTM Conferences (1), Lecture Notes in Computer Science vol. 4275 2006 Springer 255 272 (Pubitemid 44891960)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4275 LNCS - I
, pp. 255-272
-
-
Wombacher, A.1
-
42
-
-
44449176510
-
Evaluation of workflow similarity measures in service discovery
-
A. Wombacher, and M. Rozie Evaluation of workflow similarity measures in service discovery M. Schoop, C. Huemer, M. Rebstock, M. Bichler, Service Oriented Electronic Commerce, LNI, GI vol. 80 2006 51 71
-
(2006)
Service Oriented Electronic Commerce, LNI, GI
, vol.80
, pp. 51-71
-
-
Wombacher, A.1
Rozie, M.2
-
43
-
-
57049164878
-
On measuring process model similarity based on high-level change operations
-
C. Li, M. Reichert, and A. Wombacher On measuring process model similarity based on high-level change operations Q. Li, S. Spaccapietra, E.S.K. Yu, A. Olivé, ER, Lecture Notes in Computer Science vol. 5231 2008 Springer 248 264
-
(2008)
ER, Lecture Notes in Computer Science
, vol.5231
, pp. 248-264
-
-
Li, C.1
Reichert, M.2
Wombacher, A.3
-
44
-
-
45849131316
-
Measuring similarity between business process models
-
B. Dongen, R.M. Dijkman, and J. Mendling Measuring similarity between business process models Z. Bellahsene, M. Léonard, CAiSE, Lecture Notes in Computer Science vol. 5074 2008 Springer 450 464
-
(2008)
CAiSE, Lecture Notes in Computer Science
, vol.5074
, pp. 450-464
-
-
Dongen, B.1
Dijkman, R.M.2
Mendling, J.3
-
46
-
-
84956993736
-
Role-based authorization constraints specification
-
G. Ahn, R. Sandhu, Role-based authorization constraints specification, ACM Trans. Inf. Syst. Secur. 3 (4) (2000).
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
-
-
Ahn, G.1
Sandhu, R.2
-
47
-
-
84992227458
-
Proposed NIST standard for Role-Based Access Control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, R. Chandramouli, Proposed NIST standard for Role-Based Access Control, ACM Trans. Inf. Syst. Secur. 4 (3) (2001).
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
48
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, V. Atluri, The specification and enforcement of authorization constraints in workflow management systems, ACM Trans. Inf. Syst. Secur. 2 (1) (1999).
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
49
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate Intranet
-
D. Ferraiolo, J. Barkley, D. Kuhn, A role-based access control model and reference implementation within a corporate Intranet, ACM Trans. Inf. Syst. Secur. 2 (1) (1999).
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, D.3
-
50
-
-
33748319570
-
An effective role administration model using organization structure
-
DOI 10.1145/1151414.1151415
-
S. Oh, R.S. Sandhu, and X. Zhang An effective role administration model using organization structure ACM Trans. Inf. Syst. Secur. 9 2 2006 113 137 (Pubitemid 44329971)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.2
, pp. 113-137
-
-
Oh, S.1
Sandhu, R.2
Zhang, X.3
-
52
-
-
57349149484
-
Delegation and satisfiability in workflow systems
-
I. Ray, N. Li (Eds.), SACMAT 2008 Estes Park, CO, USA, June 11-13 ACM, 2008
-
J. Crampton, H. Khambhammettu, Delegation and satisfiability in workflow systems, in: I. Ray, N. Li (Eds.), SACMAT 2008, Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 1113, 2008, ACM, 2008, pp. 3140.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 31-40
-
-
Crampton, J.1
Khambhammettu, H.2
-
53
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environments
-
M. Strembeck, G. Neumann, An integrated approach to engineer and enforce context constraints in RBAC environments, ACM Trans. Inf. Syst. Secur. 7 (3) (2004).
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.3
-
-
Strembeck, M.1
Neumann, G.2
-
55
-
-
70450248454
-
Evaluating role mining algorithms
-
ACM
-
I. Molloy, N. Li, T. Li, Z. Mao, Q. Wang, and J. Lobo Evaluating role mining algorithms Proceedings of the 14th ACM Symposium on Access Control Models and Technologies 2009 ACM 95 104
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies
, pp. 95-104
-
-
Molloy, I.1
Li, N.2
Li, T.3
Mao, Z.4
Wang, Q.5
Lobo, J.6
-
57
-
-
58549097732
-
Authorization and obligation policies in dynamic systems
-
M. Gelfond, and J. Lobo Authorization and obligation policies in dynamic systems Logic Program. 2009 22 36
-
(2009)
Logic Program.
, pp. 22-36
-
-
Gelfond, M.1
Lobo, J.2
-
58
-
-
84876359591
-
Auditing workflow executions against dataflow policies
-
Springer
-
R. Accorsi, and C. Wonnemann Auditing workflow executions against dataflow policies Business Information Systems 2010 Springer 207 217
-
(2010)
Business Information Systems
, pp. 207-217
-
-
Accorsi, R.1
Wonnemann, C.2
-
59
-
-
38049132539
-
Modeling of task-based authorization constraints in bpmn
-
C. Wolter, and A. Schaad Modeling of task-based authorization constraints in bpmn G. Alonso, P. Dadam, M. Rosemann, Business Process Management, Proceedings of the 5th International Conference, BPM 2007, Brisbane, Australia, September 2428, 2007, Lecture Notes in Computer Science vol. 4714 2007 Springer 64 79
-
(2007)
Business Process Management, Proceedings of the 5th International Conference, BPM 2007, Brisbane, Australia, September 2428, 2007, Lecture Notes in Computer Science
, vol.4714
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
|