Integrating constraints to support legally flexible business processes
Author
Abstract
Suggested Citation
DOI: 10.1007/s10796-009-9190-z
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Wil van der Aalst & Kees van Hee, 2004. "Workflow Management: Models, Methods, and Systems," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262720469, April.
- Xiaofeng Yu & Yan Zhang & Tian Zhang & Linzhang Wang & Jun Hu & JianHua Zhao & Xuandong Li, 2007. "A model-driven development framework for enterprise Web services," Information Systems Frontiers, Springer, vol. 9(4), pages 391-409, September.
- Lawrence A. Gordon & Martin P. Loeb, 2006. "Economic aspects of information security: An emerging field of research," Information Systems Frontiers, Springer, vol. 8(5), pages 335-337, December.
- Frederica Paci & Elisa Bertino & Jason Crampton, 2008. "An Access-Control Framework for WS-BPEL," International Journal of Web Services Research (IJWSR), IGI Global, vol. 5(3), pages 20-43, July.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
- Riccardo Cognini & Flavio Corradini & Stefania Gnesi & Andrea Polini & Barbara Re, 2018. "Business process flexibility - a systematic literature review with a software systems perspective," Information Systems Frontiers, Springer, vol. 20(2), pages 343-371, April.
- Riccardo Cognini & Flavio Corradini & Stefania Gnesi & Andrea Polini & Barbara Re, 0. "Business process flexibility - a systematic literature review with a software systems perspective," Information Systems Frontiers, Springer, vol. 0, pages 1-29.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
- Simon Gorecki & Jalal Possik & Gregory Zacharewicz & Yves Ducq & Nicolas Perry, 2020. "A Multicomponent Distributed Framework for Smart Production System Modeling and Simulation," Sustainability, MDPI, vol. 12(17), pages 1-26, August.
- Sagnika Sen & T. S. Raghu, 2013. "Interdependencies in IT Infrastructure Services: Analyzing Service Processes for Optimal Incentive Design," Information Systems Research, INFORMS, vol. 24(3), pages 822-841, September.
- Guoxin Su & Li Liu, 2024. "Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification," Future Internet, MDPI, vol. 16(9), pages 1-19, September.
- Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
- Xing Gao & Siyu Gong, 2022. "An economic analysis of information security outsourcing with competitive firms," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 43(7), pages 2748-2758, October.
- Pereira José Luís & e Sá Jorge Oliveira, 2017. "Process-Based Information Systems Development: Taking Advantage of a Component-Based Infrastructure," Business Systems Research, Sciendo, vol. 8(2), pages 71-83, September.
- Tyson R. Browning & Ernst Fricke & Herbert Negele, 2006. "Key concepts in modeling product development processes," Systems Engineering, John Wiley & Sons, vol. 9(2), pages 104-128, June.
- Daehyoun Choi & Hind R’bigui & Chiwoon Cho, 2021. "Candidate Digital Tasks Selection Methodology for Automation with Robotic Process Automation," Sustainability, MDPI, vol. 13(16), pages 1-18, August.
- Christian Engel & Philipp Ebel & Jan Marco Leimeister, 2022. "Cognitive automation," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 339-350, March.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Reijers, H.A. & Vanderfeesten, I. & van der Aalst, W.M.P., 2016. "The effectiveness of workflow management systems: A longitudinal study," International Journal of Information Management, Elsevier, vol. 36(1), pages 126-141.
- Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
- Tyrychtr, Jan, 2017. "Economic Value of Information Systems in Agriculture: Cohesion and Coupling of Information Elements," AGRIS on-line Papers in Economics and Informatics, Czech University of Life Sciences Prague, Faculty of Economics and Management, vol. 9(3), September.
- Alex K. S. Wong & Lawrence W. C. Chan & Ying Liu, 2009. "Automating object-oriented integration and visualization of multidisciplinary biomedical data in radiology workflow: Compartmental PACS model," Information Systems Frontiers, Springer, vol. 11(4), pages 369-379, September.
- D. Venkatesan & S. Sridhar, 2017. "A novel programming framework for architecting next generation enterprise scale information systems," Information Systems and e-Business Management, Springer, vol. 15(2), pages 489-534, May.
- Loic Mar'echal & Alain Mermoud & Dimitri Percia David & Mathias Humbert, 2024. "Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data," Papers 2402.04765, arXiv.org, revised Feb 2024.
- Xing Gao & Weijun Zhong, 2015. "Information security investment for competitive firms with hacker behavior and security requirements," Annals of Operations Research, Springer, vol. 235(1), pages 277-300, December.
- D. Venkatesan & S. Sridhar, 0. "A novel programming framework for architecting next generation enterprise scale information systems," Information Systems and e-Business Management, Springer, vol. 0, pages 1-46.
- Daniel S. Soper & Haluk Demirkan & Michael Goul, 2007. "An interorganizational knowledge-sharing security model with breach propagation detection," Information Systems Frontiers, Springer, vol. 9(5), pages 469-479, November.
More about this item
Keywords
Authorization; Constraint; Business process; Flexibility;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:13:y:2011:i:2:d:10.1007_s10796-009-9190-z. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.