• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,426
Next 10 →

Workflow Systems

by Thomas Bellocci, Shimon Y. Nof, Thomas Bellocci, Shimon Y. Nof
"... The design and operation of autonomous agents to assure information in ERP systems of inter-networked enterprises are investigated. A variable information assurance implementation model is proposed based on the AIMIS model, and a risk assessment procedure is applied. The protocols and models needed ..."
Abstract - Add to MetaCart
The design and operation of autonomous agents to assure information in ERP systems of inter-networked enterprises are investigated. A variable information assurance implementation model is proposed based on the AIMIS model, and a risk assessment procedure is applied. The protocols and models needed

Time Constraints in Workflow Systems

by Johann Eder, Euthimios Panagos, Michael Rabinovich - In Proc. of the 11 th International Conference on Advanced Information Systems Engineering (CAiSE’99), Springer Verlag, LNCS 1626 , 1999
"... . Time management is a critical component of workflow-based process management. Important aspects of time management include planning of workflow process execution in time, estimating workflow execution duration, avoiding deadline violations, and satisfying all external time constraints such as fixe ..."
Abstract - Cited by 82 (8 self) - Add to MetaCart
constraints is crucial in designing and managing business processes. Consequently, time management should be part of the core management functionality provided by workflow systems to control the lifecycle of processes. At build-time, when workflow schemas are developed and defined, workflow modelers need

Provenance in scientific workflow systems

by Susan Davidson, Sarah Cohen-Boulakia, Anat Eyal, Bertram Ludäscher, Timothy McPhillips, Shawn Bowers, Manish Kumar Anand, Juliana Freire
"... The automated tracking and storage of provenance information promises to be a major advantage of scientific workflow systems. We discuss issues related to data and workflow provenance, and present techniques for focusing user attention on meaningful provenance through “user views,” for managing the ..."
Abstract - Cited by 48 (8 self) - Add to MetaCart
The automated tracking and storage of provenance information promises to be a major advantage of scientific workflow systems. We discuss issues related to data and workflow provenance, and present techniques for focusing user attention on meaningful provenance through “user views,” for managing

Scientific workflow systems

by Jacques Wainer , Mathias Weske, Gottfried Vossen, Claudia Bauzer Medeiros , 1997
"... This paper will discuss some of the basic assumptions behind office work and scientific work, and show that workflow systems for these two endeavors should have different functionalities. In particular we discuss the idea that data management and management of workflow models are the most importa ..."
Abstract - Cited by 21 (3 self) - Add to MetaCart
This paper will discuss some of the basic assumptions behind office work and scientific work, and show that workflow systems for these two endeavors should have different functionalities. In particular we discuss the idea that data management and management of workflow models are the most

On the Satisfiability of Constraints in Workflow Systems

by Jason Crampton , 2004
"... The specification and enforcement of authorization policies such as separation of duty and binding of duty in workflow systems is an important area of current research in computer security. We introduce a formal model for constrained workflow systems that incorporate constraints for implementing suc ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The specification and enforcement of authorization policies such as separation of duty and binding of duty in workflow systems is an important area of current research in computer security. We introduce a formal model for constrained workflow systems that incorporate constraints for implementing

Study of the Reusable Workflow System

by Haibo Li, Dechen Zhan
"... Abstract: Reusable development can promote the productivity of large workflow systems development. However it has not precluded developers from designing workflow system tailoring to users ’ specific needs, though workflow management coalition standardized the five kinds of abstract interfaces of wo ..."
Abstract - Add to MetaCart
Abstract: Reusable development can promote the productivity of large workflow systems development. However it has not precluded developers from designing workflow system tailoring to users ’ specific needs, though workflow management coalition standardized the five kinds of abstract interfaces

1. What are Workflow Systems? Security for Workflow Systems

by Vijay Atluri
"... Organizations constantly reengineer and optimize their business processes to reduce costs, deliver timely services, and enhance their competitive advantage in the market. Reengineering involves assessment, analysis, and redesign of business processes, including introducing new processes into existin ..."
Abstract - Add to MetaCart
by successfully separating the access of data from the applications. However, any change and enhancement to the business policies would entail modifying application code, as the business policy is still mainly hard-coded [ED97]. Workflow systems are a step in the direction in providing both automation

An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure

by Diimitrios Georgakopoulos, Mark Hornick, Amit Sheth - DISTRIBUTED AND PARALLEL DATABASES , 1995
"... Today’s business enterprises must deal with global competition, reduce the cost of doing business, and rapidly develop new services and products. To address these requirements enterprises must constantly reconsider and optimize the way they do business and change their information systems and appl ..."
Abstract - Cited by 670 (26 self) - Add to MetaCart
commercial workflow technology and extend the scope and mission of workflow management systems to support increased workflow automation in complex real-world environments involving heterogeneous, autonomous, and distributed information systems. In particular, we discuss how distributed object management

Temporal reasoning in workflow systems

by Claudio Bettini, X. Sean Wang, Sushil Jajodia, Temporal Reasoning, Workflow Systems, Claudio Bettini, X. Sean, Wang Sushil Jajodia - Distributed and Parallel Databases
"... In a workflow system, autonomous agents perform various activities cooperatively to complete a common task. Successful completion of the task often depends on correct synchronization and scheduling of agents ’ activities. It would greatly enhance the capabilities of current workflow systems if quant ..."
Abstract - Cited by 21 (1 self) - Add to MetaCart
In a workflow system, autonomous agents perform various activities cooperatively to complete a common task. Successful completion of the task often depends on correct synchronization and scheduling of agents ’ activities. It would greatly enhance the capabilities of current workflow systems

Satisfiability and Resiliency in Workflow Systems

by Qihua Wang, Ninghui Li
"... Abstract. We propose the role-and-relation-based access control (R 2 BAC) model for workflow systems. In R 2 BAC, in addition to a user’s role memberships, the user’s relationships with other users help determine whether the user is allowed to perform a certain step in a workflow. For example, a con ..."
Abstract - Cited by 11 (3 self) - Add to MetaCart
Abstract. We propose the role-and-relation-based access control (R 2 BAC) model for workflow systems. In R 2 BAC, in addition to a user’s role memberships, the user’s relationships with other users help determine whether the user is allowed to perform a certain step in a workflow. For example, a
Next 10 →
Results 1 - 10 of 6,426
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University