Identification and analysis of handovers in organisations using process model repositories

M Leyer, D Iren, B Aysolmaz - Business Process Management …, 2020 - emerald.com
Purpose Identifying handovers is an important but difficult to achieve goal for companies as
handovers have advantages allowing for specialisation in processes as well as …

[PDF][PDF] Constrained role-engineering optimization using Boolean matrix decomposition and integer linear programming techniques

W Sun - … Journal of Innovative Computing, Information and …, 2022 - ijicic.org
Role-based access control (RBAC) is a widely popular access control mechanism because
of its convenience for authorization administration, as well as various security policies, such …

Terminology for evolving design artifacts

H Schlieter, J Stark, M Burwitz, R Braun - 2019 - aisel.aisnet.org
Many design researchers evolve artifacts in succeeding projects. Yet, these researchers lack
a terminology to describe how their artifacts evolve. We provide such a terminology by …

УДОСКОНАЛЕННЯ МЕТОДУ ВИЯВЛЕННЯ НЕПРАВДИВОЇ ІНФОРМАЦІЇ ЗА ДОПОМОГОЮ БАЙЕСОВСКОГО КЛАСИФІКАТОРА.

Н Лукова-Чуйко, Т Лаптєва - Ukrainian Scientific Journal of …, 2022 - search.ebscohost.com
У статті наведено аналіз рішень прикладних задач, що вирішуюся шляхом
застосування методів кластерного аналізу. Це і класичні задачі Data Mining …

Role-mining optimization with separation-of-duty constraints and security detections for authorizations

W Sun, S Wei, H Guo, H Liu - Future Internet, 2019 - mdpi.com
Role-based access control (RBAC), which has been regarded as one of the most popular
access-control mechanisms, is featured by the separation-of-duty constraints, mutually …

Role-engineering optimization with cardinality constraints and user-oriented mutually exclusive constraints

W Sun, H Su, H Liu - Information, 2019 - mdpi.com
Role-based access control (RBAC) is one of the most popular access-control mechanisms
because of its convenience for management and various security policies, such as …

Hybrid Role‐Engineering Optimization with Multiple Cardinality Constraints Using Natural Language Processing and Integer Linear Programming Techniques

W Sun - Mobile Information Systems, 2022 - Wiley Online Library
Role‐based access control (RBAC) is a widely popular access control mechanism because
of its convenience for authorization administration, as well as various security policies, such …

Delegation Security Analysis in Workflow Systems

B Yang, H Hu - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
User delegation is a type of access control mechanisms that allow a person to delegate all
or part of his her authorities to others. It is an important access control policy that can …

Detecting role inconsistencies in process models

B Aysolmaz, D Iren, HA Reijers - … Systems for a Sharing …, 2019 - cris.maastrichtuniversity.nl
Business process models capture crucial information about business operations. To
overcome the challenge of maintaining process definitions in large process repositories …

[PDF][PDF] A Survey of Process Models Used for Process Description

D Hostacna - 2021 - is.muni.cz
Reaching a particular goal requires series of steps to be carried out. In an organization, such
sequences of tasks and actions are called business processes. In order to communicate any …