IEEE International Conference on Web Services (ICWS 2007) 2007
DOI: 10.1109/icws.2007.85
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Runtime Adaptation ofWorkflows to External Events in Enterprise Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…The tasks and role assignment constraints are shown in Table 2. Product and Rate decision engine FA/LB/BM t 3 Collecting data FA/LB/CL t 4 Analysing data of third-party 1 FA/LB/CL t 5 Analysing data of third-party 2 FA/LB/CL t 6 Analysing business rules FA/BM t 7 Underwriting UW/BM Assume that the following BoD and SoD constraints are imposed on the tasks, where r(ti) denotes the role assigned to task ti.…”
Section: Assembling Authorisation Modulesmentioning
confidence: 99%
See 1 more Smart Citation
“…The tasks and role assignment constraints are shown in Table 2. Product and Rate decision engine FA/LB/BM t 3 Collecting data FA/LB/CL t 4 Analysing data of third-party 1 FA/LB/CL t 5 Analysing data of third-party 2 FA/LB/CL t 6 Analysing business rules FA/BM t 7 Underwriting UW/BM Assume that the following BoD and SoD constraints are imposed on the tasks, where r(ti) denotes the role assigned to task ti.…”
Section: Assembling Authorisation Modulesmentioning
confidence: 99%
“…Business processes or workflows are often used to model enterprise applications [6]. A workflow consists of multiple activities or tasks with precedence constraints.…”
Section: Introductionmentioning
confidence: 99%
“…Business processes or workflows are often used to model enterprise applications [1] [2][3] [4]. A workflow consists of multiple activities or tasks with precedence constraints.…”
Section: Introductionmentioning
confidence: 99%
“…When we design workflow management/scheduling strategies or plan resource capacities, it is often assumed that when a task is allocated to a resource, the resource will accept the task and start the execution once the processor becomes available [7][8] [9]. However, the authorization policies impose further constraints on task executions and therefore, may incur performance penalty and affect both application-and systemoriented performance.…”
Section: Introductionmentioning
confidence: 99%