2011
DOI: 10.1016/j.jss.2011.03.077
|View full text |Cite
|
Sign up to set email alerts
|

Deriving business processes with service level agreements from early requirements

Abstract: Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0
2

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 33 publications
0
8
0
2
Order By: Relevance
“…For instance, the works in [19], [11], [3] incorporate such an approach in the context of security, while the PriS framework [10] does the same for privacy requirements. In contrast to our approach, the focus of the analysis provided by other works in this area is rather one-dimensional, as they focus on either the social (e.g., interactions between actors and resources) or the technical aspects of security (e.g., selection of services to implement security features).…”
Section: Related Workmentioning
confidence: 99%
“…For instance, the works in [19], [11], [3] incorporate such an approach in the context of security, while the PriS framework [10] does the same for privacy requirements. In contrast to our approach, the focus of the analysis provided by other works in this area is rather one-dimensional, as they focus on either the social (e.g., interactions between actors and resources) or the technical aspects of security (e.g., selection of services to implement security features).…”
Section: Related Workmentioning
confidence: 99%
“…Process [74], [110], [106], [210], [50], [67], [206], [131], [196], [114], [97], [180], [100], [22], [113], [38], [168], [197], [181], [79], [109], [58], [70], [190], [44], [16], [80], [91], [84], [78], [159], [4], [129], [215], [147], [82], [68], [19], [28], [42], [60], [63], [86], [98], [115], [117], [119], [179], [216], [212], …”
Section: Dimension Referencesunclassified
“…Model-Driven [47], [130], [176], [217], [16], [4], [129], [18], [195], [21], [63], [87], [51], [156], [9].…”
Section: Dimension Referencesmentioning
confidence: 99%
“…Business Processes with Service Level Agreements (BP&SLA) methodology is used to design executable business processes together with SLA from high-level user requirements [23].…”
Section: IImentioning
confidence: 99%