2015
DOI: 10.1007/s10586-015-0494-0
|View full text |Cite|
|
Sign up to set email alerts
|

Runtime self-monitoring approach of business process compliance in cloud environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…As additional requirements, [4] emphasize the resolution of ambiguities and inconsistencies in the compliance constraint base as well as the efficiency/performance of the CM approach in order to deal with a large volume of events. [6,5,90] cover CMF1 and CMF3 based on process rewriting, anti-patterns, and complex event processing. In addition, the approach supports life cycles ( → CMF5).…”
Section: Findings For CMmentioning
confidence: 99%
“…As additional requirements, [4] emphasize the resolution of ambiguities and inconsistencies in the compliance constraint base as well as the efficiency/performance of the CM approach in order to deal with a large volume of events. [6,5,90] cover CMF1 and CMF3 based on process rewriting, anti-patterns, and complex event processing. In addition, the approach supports life cycles ( → CMF5).…”
Section: Findings For CMmentioning
confidence: 99%
“…This leads, however, to somewhat bloated BPMN models, because much more constructs are used. For instance, Barnawi et al [60] use the expressiveness of BPMN to embed tasks to detect and handle violations of compliance. To enable checking, it is assumed that the process engine provides information such as the completion time of tasks.…”
Section: Existing Work Related To Q2mentioning
confidence: 99%
“…The work presented by Alhamazani et al discussed several monitoring tools developed for the cloud computing environment. However, these tools have mainly focused on monitoring the low level aspects of resources deployed in the cloud (eg, memory, CPU, disk) . Our framework considers the monitoring and compliance of the high level and logical security aspects of the cloud computing business process without relying on any external monitoring component where the entire execution environment is mainly controlled by the cloud providers.…”
Section: Related Workmentioning
confidence: 99%
“…However, these tools have mainly focused on monitoring the low level aspects of resources deployed in the cloud (eg, memory, CPU, disk). 42 Our framework considers the monitoring and compliance of the high level and logical security aspects of the cloud computing business process without relying on any external monitoring component where the entire execution environment is mainly controlled by the cloud providers. CloudWatch 46 is a monitoring service providing comprehensive monitoring for cloud resources and applications run by customers on Amazon Web Services (AWS).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation