2012 IEEE 19th International Conference on Web Services 2012
DOI: 10.1109/icws.2012.91
|View full text |Cite
|
Sign up to set email alerts
|

An Approach for Producing Privacy-Aware Reusable Business Process Fragments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(15 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…A limitation of this approach might be that describing data objects does not influence sharing analysis, and consequently, the obtained fragments would be the same as when data objects are not taken into consideration. The work presented in (Zemni et al 2012) is another approach that analyses process fragmentation from another unique point of view. In this work, the authors propose an approach based on Formal Concept Analysis (FAC) for generating privacy-aware reusable process figments.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A limitation of this approach might be that describing data objects does not influence sharing analysis, and consequently, the obtained fragments would be the same as when data objects are not taken into consideration. The work presented in (Zemni et al 2012) is another approach that analyses process fragmentation from another unique point of view. In this work, the authors propose an approach based on Formal Concept Analysis (FAC) for generating privacy-aware reusable process figments.…”
Section: Related Workmentioning
confidence: 99%
“…G4 (Eberle et al 2009;Seidita et al 2011;Zemni et al 2012;Assy et al 2013) A connected portion of a process intended for reuse and contains no cycles and a single control flow linking up two distinct activities. It is made of at least one activity and several controls.…”
Section: Q3: Is the Definition Precise And Deterministic?mentioning
confidence: 99%
“…To avoid the redesign of existing fragments, some researchers decompose the existing service processes to generate reusable process fragments. Some of those approaches hold the decomposition level of the existing business process into reusable fragments . Others skip the decomposition level and proceed directly to the composition, like in Nacer et al and Yang et al The following subsections will detail the 2 types of approaches and present their limits.…”
Section: Mcsc Approachesmentioning
confidence: 99%
“…Examples of works include previous studies . The rest of the approaches, as shown in Figure , either they deal with all service models (eg, cloud or web services), so they use the term service in general like in Yang et al, or they reuse generated process fragments such as Nacer et al and Zemni et al Few other approaches use other types of service models, such as the mashup in Zhang et al…”
Section: Comparison Of Existing Approachesmentioning
confidence: 99%
“…In a previous work [5,6], we have presented an approach for business process decomposition into all possible fragments while maintaining the privacy of sensitive information. In this paper, we present a two-phases requirementsdriven approach to provide safe, useful and reusable business process fragments while dealing with designers'requirements.…”
Section: Introductionmentioning
confidence: 99%