Process mining techniques are able to extract knowledge from event logs commonly available in today’s information systems. These techniques provide new means to discover, monitor, and improve processes in a variety of application domains. There are two main drivers for the growing interest in process mining. On the one hand, more and more events are being recorded, thus, providing detailed information about the history of processes. On the other hand, there is a need to improve and support business processes in competitive and rapidly changing environments. This manifesto is created by the IEEE Task Force on Process Mining and aims to promote the topic of process mining. Moreover, by defining a set of guiding principles and listing important challenges, this manifesto hopes to serve as a guide for software developers, scientists, consultants, business managers, and end-users. The goal is to increase the maturity of process mining as a new tool to improve the (re)design, control, and support of operational business processes
Abstract-In this paper, we study the resilience of supply networks against disruptions and provide insights to supply chain managers on how to construct a resilient supply network from the perspective of complex network topologies. Our goal is to study how different network topologies, which are created from different growth models, affect the network's resilience against both random and targeted disruptions. Of particular interest are situations where the type of disruption is unknown. Using a military logistic network as a case study, we propose new network resilience metrics that reflect the heterogeneous roles (e.g., supply, relay, and demand) of nodes in supply networks. We also present a hybrid and tunable network growth model called Degree and Locality-based Attachment (DLA), in which new nodes make connections based on both degree and locality. Using computer simulations, we compare the resilience of several supply network topologies that are generated with different growth models. The results show that the new resilience metrics can capture important resilience requirements for supply networks very well. We also found that the supply network topology generated by the DLA model provides balanced resilience against both random and targeted disruptions.
Blockchain technology is based on the idea of a distributed, replicated, and immutable digital ledger that enables parties to conduct business in a trustful and transparent way without the need for a central authority or intermediary. Its most popular application thus far is in payment system applications, e.g., bitcoin. This disruptive technology is expected to contribute significant business value to multiple industry sectors, including supply chain management (SCM), where it can provide greater visibility, accountability and trust in interorganizational business collaboration. In this article, we review some fundamental concepts of Hyperledger Fabric, one of the most mature permissioned blockchain implementations. Further, we use the context of a food supply chain to highlight key design and implementation challenges for blockchain, and provide a strategic assessment of its prospects. Our aim is to dispel misguided notions and myths about blockchain as a silver bullet for all businesses. We believe it is important to penetrate the hype to allow a more realistic understanding of this technology. Blockchain is a high‐cost, high‐overhead storage medium. It is viable only when its higher cost is counterbalanced by the set of benefits that are identified by a careful and thorough analysis of the business. Thus, it will be used mainly for storing important data related to interorganizational transactions among partners where trust is lacking and provenance and visibility are critical. Our paper offers enterprises a systematic way to understand the real costs and risks of blockchain adoption. The insights gained in the SCM context also apply to other areas such as financial services and healthcare that could leverage the full potential of blockchain technology.
This paper presents a pair of role-based access control models for workflow systems, collectively known as the W-RBAC models. The first of these models, W0-RBAC is based on a framework that couples a powerful RBAC-based permission service and a workflow component with clear separation of concerns for ease of administration of authorizations. The permission service is the focus of the work, providing an expressive logic-based language for the selection of users authorized to perform workflow tasks, with preference ranking. W1-RBAC extends the basic model by incorporating exception handling capabilities through controlled and systematic overriding of constraints.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.