2018
DOI: 10.1109/access.2018.2791666
|View full text |Cite
|
Sign up to set email alerts
|

Event-Driven Process Chain for Modeling and Verification of Business Requirements–A Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 42 publications
(19 citation statements)
references
References 85 publications
0
16
0
1
Order By: Relevance
“…Its inventor, A. W. Scheer, says "as opposed to freely drawn sketches, tables make event-driven process chains (EPCs) more readable, but they also impede the illustration of complex procedural structures such as loops" [5] (p. 16). The results of the systematic review by A. Amjad et al [6] confirm the broad range of applications for EPC diagrams in scientific work, including the construction of reference models [7].…”
Section: Introductionmentioning
confidence: 58%
“…Its inventor, A. W. Scheer, says "as opposed to freely drawn sketches, tables make event-driven process chains (EPCs) more readable, but they also impede the illustration of complex procedural structures such as loops" [5] (p. 16). The results of the systematic review by A. Amjad et al [6] confirm the broad range of applications for EPC diagrams in scientific work, including the construction of reference models [7].…”
Section: Introductionmentioning
confidence: 58%
“…Security analysis frameworks (10) Vulnerability models and metrics (7) Security evaluation reports (11) Security challenges (23) Challenges in test design (18) Challenges in non-functional aspects (5) Quality management challenges (19) Data quality challenges (3) Privacypreservation schemas and protocols (25) Privacy-aware policies and architectures (28) Privacy testing techniques (5) Privacy and trust models (8) Security concepts and policies (49) Authentication schemas and protocols (27) Security-aware architectures & frameworks (45) Security and intrusion models (7) Encryption schemas and protocols (6) Other security schemas and protocols (21) Anomaly detection approaches (5) Security performance analysis (5) based on the code insertion methodology to address the interaction with the physical world. To test the applicability and efficiency of classical approaches, the study emulated the IoT resources from an implementation perspective.…”
Section: Security Analysis Approaches and Techniques (23)mentioning
confidence: 99%
“…It acts as a supporting pillar for the business process modeling and implementation. The event-driven process value chain is also being used for modeling business requirement [28], [29]. It has widely been adopted since then.…”
Section: B Bpmn For Erp Systemsmentioning
confidence: 99%