-
2
-
-
33646698687
-
Process Mining and Verification of Properties: An Approach based on Temporal Logic
-
Meersman, R., Tari, Z. (eds.) OTM 2005, Part I. Springer, Heidelberg
-
van der Aalst, W.M.P., de Beer, H., van Dongen, B.: Process Mining and Verification of Properties: An Approach based on Temporal Logic. In: Meersman, R., Tari, Z. (eds.) OTM 2005, Part I. LNCS, vol. 3760, pp. 130-147. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3760
, pp. 130-147
-
-
Van Der Aalst, W.M.P.1
De Beer, H.2
Van Dongen, B.3
-
6
-
-
84889269573
-
-
John Wiley & Sons, Inc.
-
Dumas, M., van der Aalst, W.M.P., ter Hofstede, A.: Process-Aware Information Systems. John Wiley & Sons, Inc. (2005)
-
(2005)
Process-Aware Information Systems
-
-
Dumas, M.1
Van Der Aalst, W.M.P.2
Ter Hofstede, A.3
-
7
-
-
84878834015
-
Business Process Compliance Checking: Current State and Future Challenges
-
El Kharbili, M., Alves de Medeiros, A., Stein, S., van der Aalst, W.: Business Process Compliance Checking: Current State and Future Challenges. In: MobIS, pp. 107-113 (2008)
-
(2008)
MobIS
, pp. 107-113
-
-
El Kharbili, M.1
Alves De Medeiros, A.2
Stein, S.3
Van Der Aalst, W.4
-
9
-
-
24644445703
-
Conformance checking of RBAC policy and its implementation
-
Information Security Practice and Experience - First International Conference, ISPEC 2005, Proceedings
-
Hansen, F., Oleshchuk, V.: Conformance Checking of RBAC Policy and its Implementation. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 144-155. Springer, Heidelberg (2005) (Pubitemid 41273785)
-
(2005)
Lecture Notes in Computer Science
, vol.3439
, pp. 144-155
-
-
Hansen, F.1
Oleshchuk, V.2
-
11
-
-
33745116233
-
Conformance testing: Measuring the fit and appropriateness of event logs and process models
-
Business Process Management Workshops - BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Revised Selected Papers
-
Rozinat, A., van der Aalst, W.M.P.: Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models. In: Bussler, C.J., Haller, A. (eds.) BPM 2005. LNCS, vol. 3812, pp. 163-176. Springer, Heidelberg (2006) (Pubitemid 43899920)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3812 LNCS
, pp. 163-176
-
-
Rozinat, A.1
Van Der, A.W.M.P.2
-
12
-
-
35748949584
-
Conformance checking of processes based on monitoring real behavior
-
Rozinat, A., van der Aalst, W.: Conformance checking of processes based on monitoring real behavior. Information Systems 33(1), 64-95 (2008)
-
(2008)
Information Systems
, vol.33
, Issue.1
, pp. 64-95
-
-
Rozinat, A.1
Van Der Aalst, W.2
-
13
-
-
0030086382
-
Role-Based Access Control Models
-
February
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer 29(2) (February 1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
14
-
-
0028513932
-
Access Control: Principles and Practice
-
September
-
Sandhu, R., Samarati, P.: Access Control: Principles and Practice. IEEE Communications 32(9) (September 1994)
-
(1994)
IEEE Communications
, vol.32
, Issue.9
-
-
Sandhu, R.1
Samarati, P.2
-
15
-
-
77249095368
-
Scenario-Driven Role Engineering
-
January/February
-
Strembeck, M.: Scenario-Driven Role Engineering. IEEE Security & Privacy 8(1) (January/February 2010)
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.1
-
-
Strembeck, M.1
-
16
-
-
79952439750
-
Modeling process-related RBAC models with extended UML activity models
-
Strembeck, M., Mendling, J.: Modeling process-related RBAC models with extended UML activity models. Information and Software Technology 53(5), 456-483 (2011)
-
(2011)
Information and Software Technology
, vol.53
, Issue.5
, pp. 456-483
-
-
Strembeck, M.1
Mendling, J.2
-
17
-
-
13544276885
-
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
-
van der Aalst, W., de Medeiros, A.: Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance. Electronic Notes in Theoretical Computer Science 121, 3-21 (2005)
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.121
, pp. 3-21
-
-
Van Der Aalst, W.1
De Medeiros, A.2
-
18
-
-
84887496788
-
ProM: The Process Mining Toolkit
-
CEUR-WS.org September
-
van der Aalst, W., van Dongen, B.F., Günther, C.W., Rozinat, A., Verbeek, H.M.W., Weijters, A.J.M.M.: ProM: The Process Mining Toolkit. In: Proceedings of the BPM 2009 Demonstration Track, vol. 489. CEUR-WS.org (September 2009)
-
(2009)
Proceedings of the BPM 2009 Demonstration Track
, vol.489
-
-
Van Der Aalst, W.1
Van Dongen, B.F.2
Günther, C.W.3
Rozinat, A.4
Verbeek, H.M.W.5
Weijters, A.J.M.M.6
-
19
-
-
0141680986
-
Workflow mining: A survey of issues and approaches
-
van der Aalst, W., van Dongen, B., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow mining: A survey of issues and approaches. Data & Knowledge Engineering 47(2) (2003)
-
(2003)
Data & Knowledge Engineering
, vol.47
, Issue.2
-
-
Van Der Aalst, W.1
Van Dongen, B.2
Herbst, J.3
Maruster, L.4
Schimm, G.5
Weijters, A.J.M.M.6
-
21
-
-
79960274887
-
ProM 6: The Process Mining Toolkit
-
CEUR-WS.org September
-
Verbeek, H.M.W., Buijs, J., van Dongen, B., van der Aalst, W.: ProM 6: The Process Mining Toolkit. In: Proceedings of BPM 2010 Demonstration Track, vol. 615, pp. 34-39. CEUR-WS.org (September 2010)
-
(2010)
Proceedings of BPM 2010 Demonstration Track
, vol.615
, pp. 34-39
-
-
Verbeek, H.M.W.1
Buijs, J.2
Van Dongen, B.3
Van Der Aalst, W.4
|