Analysis of information quality requirements in business processes, revisited

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements

This paper presents InDico, an approach for the automated analysis of business processes against confidentiality requirements. InDico is motivated by the fact that in spite of the correct deployment of access control mechanisms, information leaks in automated business processes can persist due to erroneous process design. InDico employs a meta-model based on Petri nets to formalize and analyze ...

متن کامل

Change Visualizations in Business Processes - Requirements Analysis

Many business processes are highly dynamic, because process changes result from unplanned events and exceptions which are unforeseen (e.g., demands of customers have changed, new legislature or design errors are detected). The management of the large collections of the different process model versions which evolve over time requires visualization approaches. Visualizations of changes between di...

متن کامل

langauge needs analysis of undergraduate business management and economics students

the aim of conducting this study was to investigate the foreign language learning needs of undergraduate economics students and business management students in faculties of social sciences of alzahra and azad naragh university. in the study, which was designed on the basis of a qualitative-quantitative basis using interviews and questionnaires, 146 female undergraduate business management as we...

15 صفحه اول

Detective Information Flow Analysis for Business Processes

We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling a forensic investigation, our approach aims at analyzing the audit trails resultant from the execution of the business processes, locating informations flows that violate the (non-functional) requirements stipulated by security...

متن کامل

Model checking authorization requirements in business processes

Business processes are usually expected to meet high level authorization requirements (e.g., Separation of Duty). Since violation of authorization requirements may lead to economic losses and/or legal implications, ensuring that a business process meets them is of paramount importance. Previous work showed that model checking can be profitably used to check authorization requirements in busines...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Requirements Engineering

سال: 2016

ISSN: 0947-3602,1432-010X

DOI: 10.1007/s00766-016-0264-4