2012
DOI: 10.1007/978-3-642-32885-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Information Flow Analysis of Business Process Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(30 citation statements)
references
References 31 publications
0
29
0
Order By: Relevance
“…information flow analysis [3,7,17,29]) on basis of process logs are envisioned, recovered models have to fulfill strict requirements. Specifically, mined models have to show the exact log behavior without introducing additional behavior.…”
Section: Control Flow Discovery Appliedmentioning
confidence: 99%
“…information flow analysis [3,7,17,29]) on basis of process logs are envisioned, recovered models have to fulfill strict requirements. Specifically, mined models have to show the exact log behavior without introducing additional behavior.…”
Section: Control Flow Discovery Appliedmentioning
confidence: 99%
“…The same path is adopted in [25] focusing on cloud-based business processes for the purpose of 6 compliance certification, where a number of Petri-net patterns are introduced. In [26], Petri-net is used focusing on information flow analysis of business process models.…”
Section: Graphical/pattern-based Approachesmentioning
confidence: 99%
“…3 non-shaded patterns) are based on [26]. The mapping for the ExistsOften pattern is introduced in [28].…”
Section: Ltl Representationmentioning
confidence: 99%
“…Re( ) = Re(exOutput( )) (10) end for (11) for each ∈ , V ∈ do (12) for each ∈ ( ) do (13) Re( ) = ⊔ max Re( ) (14) end for (15) if (5) send success message with secure execution path to the requestor (6) else (7) push , into the Execution Path…”
Section: Service Verificationmentioning
confidence: 99%