-
1
-
-
84858820512
-
International Convergence of capital measurement and capital standards: A revised framework
-
Basel II: International Convergence of capital measurement and capital standards: A revised framework, Bank for International Settlements (2004).
-
(2004)
Bank for International Settlements
-
-
Basel, I.I.1
-
3
-
-
38049150939
-
Modeling control objectives for business process compliance
-
Australia
-
S. Sadiq, G. Governatori and K. Naimiri, Modeling control objectives for business process compliance, in 10th BPM'07 (Australia, 2007), pp. 149-164.
-
(2007)
10th BPM'07
, pp. 149-164
-
-
Sadiq, S.1
Governatori, G.2
Naimiri, K.3
-
4
-
-
84858844918
-
-
Pisa, Italy
-
A. Elgammal, O. Turetken, W. van den Heuvel and M. Papazoglou, On the formal specification of business contracts and regulatory compliance, in 4th FLACOS (Pisa, Italy, 2010), pp. 33-36.
-
(2010)
On the Formal Specification of Business Contracts and Regulatory Compliance, in 4th FLACOS
, pp. 33-36
-
-
Elgammal, A.1
Turetken, O.2
Heuvel Den W.Van3
Papazoglou, M.4
-
6
-
-
84903203138
-
Branching vs. Linear Time: Final Showdown
-
Tools and Algorithms for the Construction and Analysis of Systems 7th International Conference, TACAS 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genova, Italy, April 2-6, 2001 Proceedings
-
M. Vardi, Branching vs. linear time: Final showdown, in 7th Int. Conf. Tools and Algorithms for the Construction and Analysis of Systems (Italy, 2001), pp. 1-22. (Pubitemid 33254646)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2031
, pp. 1-22
-
-
Vardi, M.Y.1
-
9
-
-
78650764843
-
Root-cause analysis of design-time compliance violations on the basis of property patterns
-
A. Elgammal, O. Turetken, W. van den Heuvel and M. Papazoglou, Root-cause analysis of design-time compliance violations on the basis of property patterns, in 8th ICSOC'10 (USA, 2010), pp. 17-31.
-
(2010)
8th ICSOC'10 (USA
, pp. 17-31
-
-
Elgammal, A.1
Turetken, O.2
Heuvel Den W.Van3
Papazoglou, M.4
-
11
-
-
84858816208
-
Towards a comprehensive design-time compliance management: A roadmap
-
A. Elgammal, O. Turetken, W. van den Heuvel and M. Papazoglou, Towards a comprehensive design-time compliance management: A roadmap, in 15th IBIMA (Egypt, 2010), pp. 1480-1484.
-
(2010)
15th IBIMA (Egypt
, pp. 1480-1484
-
-
Elgammal, A.1
Turetken, O.2
Heuvel Den W.Van3
Papazoglou, M.4
-
12
-
-
34247861351
-
A static compliance-checking framework for business process models
-
Y. Liu, S. Muller and K. Xu, A static compliance-checking framework for business process models, IBM Syst. J. 46 (2007).
-
(2007)
IBM Syst. J.
, pp. 46
-
-
Liu, Y.1
Muller, S.2
Xu, K.3
-
13
-
-
44249088573
-
A Calculus for Generation, Verification and Refinement of BPEL Specifications
-
DOI 10.1016/j.entcs.2008.04.092, PII S1571066108003071
-
F. Abouzaid and J. Mullins, A calculus for generation, verification, and refinement of BPEL specifications, Electron. Notes Theor. Comput. Sci. 200 (2008) 43-65. (Pubitemid 351720980)
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.200
, Issue.3
, pp. 43-65
-
-
Abouzaid, F.1
Mullins, J.2
-
14
-
-
84944105044
-
Regulations expressed as logical models
-
Belgium
-
C. Giblin, A. Liu, S. Muller, B. Pfitzmann and X. Zhou, Regulations expressed as logical models, in 18th Int. Conf. Legal Knowledge and Information Systems (Belgium, 2005), pp. 37-48.
-
(2005)
18th Int. Conf. Legal Knowledge and Information Systems
, pp. 37-48
-
-
Giblin, C.1
Liu, A.2
Muller, S.3
Pfitzmann, B.4
Zhou, X.5
-
15
-
-
19944405131
-
Analysis of interacting BPEL Web services
-
Thirteenth International World Wide Web Conference Proceedings, WWW2004
-
X. Fu, T. Bultan and J. Su, Analysis of interacting BPEL web services, in WWW'04 (USA, 2004), pp. 621-630. (Pubitemid 40752796)
-
(2004)
Thirteenth International World Wide Web Conference Proceedings, WWW2004
, pp. 621-630
-
-
Fu, X.1
Bultan, T.2
Su, J.3
-
17
-
-
33646780536
-
Model-Checking Behavioral Specification of BPEL Applications
-
DOI 10.1016/j.entcs.2005.07.038, PII S1571066106003380
-
S. Nakajima, Model-checking behavioral specification of bpel applications, Electron. Notes Theor. Comput. Sci. 151 (2006) 89-105. (Pubitemid 43767027)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.151
, Issue.2 SPEC. ISS.
, pp. 89-105
-
-
Nakajima, S.1
-
18
-
-
33749986269
-
Analyzing interacting BPEL processes
-
Business Process Management - 4th International Conference, BPM 2006, Proceedings LNCS
-
N. Lohmann, P. Massuthe, C. Stahl and D. Weinberg, Analyzing interacting BPEL processes, in BPM2006 (Austria, 2006), pp. 17-32. (Pubitemid 44568316)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4102
, pp. 17-32
-
-
Lohmann, N.1
Massuthe, P.2
Stahl, C.3
Weinberg, D.4
-
23
-
-
35048883047
-
-
Conf. Computer Aided Verification (USA
-
X. Fu, T. Bultan and J. Su, WSAT: A tool for formal analysis of web services, in 16th Int. Conf. Computer Aided Verification (USA, 2004), pp. 510-514.
-
(2004)
WSAT: A Tool for Formal Analysis of Web Services, in 16th Int
, pp. 510-514
-
-
Fu, X.1
Bultan, T.2
Su, J.3
-
24
-
-
33749984776
-
Verifying BPEL workflows under authorisation constraints
-
Business Process Management - 4th International Conference, BPM 2006, Proceedings LNCS
-
Z. Xiangpeng, A. Cerone and P. Krishnan, Verifying BPEL workflows under authorisation constraints, in BPM'06 (Austria, 2006), pp. 439-444. (Pubitemid 44568349)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4102
, pp. 439-444
-
-
Zhao, X.1
Cerone, A.2
Krishnan, P.3
-
25
-
-
38049132539
-
Modeling of task-based authorization constraints in BPMN
-
Australia
-
C. Wolter and A. Schaad, Modeling of task-based authorization constraints in BPMN, in BPM'07 (Australia, 2007), pp. 64-79.
-
(2007)
BPM'07
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
-
26
-
-
75649086163
-
Specification, Verification and explanation of violation for data aware compliance rules
-
A. Awad, M. Weidlich and M. Weske, Specification, Verification and explanation of violation for data aware compliance rules, in 7th Int. Conf. Service Oriented Computing (ICSOC-Service Wave'09) (2009), pp. 500-515.
-
(2009)
7th Int. Conf. Service Oriented Computing (ICSOC-Service Wave'09
, pp. 500-515
-
-
Awad, A.1
Weidlich, M.2
Weske, M.3
-
27
-
-
73449141410
-
Specifying and validating data-aware temporal web service properties
-
S. Halle, R. Villemaire and O. Cherkaoui, Specifying and validating data-aware temporal web service properties, IEEE Trans. Softw. Eng. 35 (2009) 669-683.
-
(2009)
IEEE Trans. Softw. Eng.
, vol.35
, pp. 669-683
-
-
Halle, S.1
Villemaire, R.2
Cherkaoui, O.3
-
28
-
-
57049183634
-
Synthesizing service composition models on the basis of temporal business rules
-
J. Yu, Y. Han, J. Han, Y. Jin, P. Falcarin and M. Morisio, Synthesizing service composition models on the basis of temporal business rules, J. Comput. Sci. Technol. 23 (2008) 885-894.
-
(2008)
J. Comput. Sci. Technol.
, vol.23
, pp. 885-894
-
-
Yu, J.1
Han, Y.2
Han, J.3
Jin, Y.4
Falcarin, P.5
Morisio, M.6
-
29
-
-
33845255047
-
Pattern based property specification and verification for service composition
-
Web Information Systems - WISE 2006: 7th International Conference on Web Information Systems Engineering, Proceedings LNCS
-
J. Yu, T. Manh, J. Han and Y. Jin, Pattern-based property specification and verification for service composition, in 7th Int. Conf. Web Information Systems Engineering (WISE06) (China, 2006), pp. 156-168. (Pubitemid 44860413)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4255
, pp. 156-168
-
-
Yu, J.1
Manh, T.P.2
Han, J.3
Jin, Y.4
Han, Y.5
Wang, J.6
-
32
-
-
0033650839
-
Injecting RBAC to secure a Web-based workflow system
-
G. Ahn, R. Sandhu, M. Kang and J. Park, Injecting RBAC to secure a Web-based workflow system, in Proc. 5th ACM Workshop on Role-Based Access Control (2000), pp. 1-10.
-
(2000)
Proc. 5th ACM Workshop on Role-Based Access Control
, pp. 1-10
-
-
Ahn, G.1
Sandhu, R.2
Kang, M.3
Park, J.4
-
33
-
-
70350635706
-
Verification of business process entailment constraints using SPIN
-
(Belgium
-
C. Wolter, P. Miseldine and C. Meinel, Verification of business process entailment constraints using SPIN, in ESSoS'09 (Belgium, 2009), pp. 1-15.
-
(2009)
ESSoS'09
, pp. 1-15
-
-
Wolter, C.1
Miseldine, P.2
Meinel, C.3
-
35
-
-
78650681397
-
Resolution of compliance violation in business process models: A planning-based approach
-
A. Awad, S. Smirnov and M. Weske, Resolution of compliance violation in business process models: A planning-based approach, in OTM Conferences (Portugal, 2009), pp. 6-23.
-
(2009)
OTM Conferences (Portugal
, pp. 6-23
-
-
Awad, A.1
Smirnov, S.2
Weske, M.3
-
36
-
-
54349115014
-
Measurement of compliance distance in business processes
-
R. Lu, S. Sadiq and G. Governatori, Measurement of compliance distance in business processes, Inf. Syst. Manage. 25 (2008) 344-355.
-
(2008)
Inf. Syst. Manage.
, vol.25
, pp. 344-355
-
-
Lu, R.1
Sadiq, S.2
Governatori, G.3
-
37
-
-
56249087275
-
Reducing false positives by combining abstract interpretation and bounded model checking
-
H. Post, C. Sinz, A. Kaiser and T. Gorges, Reducing false positives by combining abstract interpretation and bounded model checking, in ASE'08 (2008).
-
(2008)
ASE'08
-
-
Post, H.1
Sinz, C.2
Kaiser, A.3
Gorges, T.4
|