2010 Eighth IEEE European Conference on Web Services 2010
DOI: 10.1109/ecows.2010.24
|View full text |Cite
|
Sign up to set email alerts
|

Secure Business Processes in Service-Oriented Architectures -- A Requirements Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…For example, choosing which third parties data is sent to can be up to the user performing a certain task in the process. A specification that is the basis for such decisions must be expressed in a form based on BP state and context [8]. There exists a proposal for an architecture of a business-process management system (BPMS) that takes context into account and allows respective configuration [10].…”
Section: Fundamentalsmentioning
confidence: 99%
“…For example, choosing which third parties data is sent to can be up to the user performing a certain task in the process. A specification that is the basis for such decisions must be expressed in a form based on BP state and context [8]. There exists a proposal for an architecture of a business-process management system (BPMS) that takes context into account and allows respective configuration [10].…”
Section: Fundamentalsmentioning
confidence: 99%