IoT capabilities composition and decomposition: A systematic review

K Halba, E Griffor, A Lbath, A Dahbura - IEEE Access, 2023 - ieeexplore.ieee.org
As billions of IoT devices join the Internet, researchers and innovators increasingly explore
IoT capabilities achieved via service composition or reuse of existing capabilities via service …

Automated compliance checking in the context of Industry 4.0: from a systematic review to an empirical fuzzy multi-criteria approach

VHC Cunha, RGG Caiado, ET Corseuil, HF Neves… - Soft Computing, 2021 - Springer
Nowadays, the industry is undergoing the Fourth Industrial Revolution, and techniques and
algorithms for automated compliance checking (ACC) are continually being improved …

Formal verification approaches in the web service composition: a comprehensive analysis of the current challenges for future research

A Souri, AM Rahmani… - International journal of …, 2018 - Wiley Online Library
Today, service composition is emerging paradigm on the communication networks such as
cloud environments, internet of things, wireless sensor network, and software‐defined …

Cross-instance regulatory compliance checking of business process event logs

N Van Beest, H Groefsema, A Cryer… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Event logs capture the execution of business processes, such that each task is represented
by an event and each individual execution is a chronological sequence of events, called an …

Change detection in dynamic event attributes

J Cremerius, M Weske - International Conference on Business Process …, 2022 - Springer
Discovering and analysing business processes are important tasks for organizations.
Process mining bridges the gap between process management and data science by …

Compliance Checking Based Detection of Insider Threat in Industrial Control System of Power Utilities

Q Chen, M Zhou, Z Cai, S Su - 2022 7th Asia Conference on …, 2022 - ieeexplore.ieee.org
Compare to outside threats, insider threats that originate within targeted systems are more
destructive and invisible. More importantly, it is more difficult to detect and mitigate these …

On the use of the conformance and compliance keywords during verification of business processes

H Groefsema, NRTP van Beest… - … Conference on Business …, 2022 - Springer
A wealth of techniques have been developed to help organizations understand their
processes, verify correctness against requirements and diagnose potential problems. In …

Model-based verification of data protection mechanisms in collaborative business processes

S Belluccini, R De Nicola, M Dumas… - Software and Systems …, 2025 - Springer
In scenarios where multiple autonomous systems collaborate to execute a business
process, it is often necessary for them to exchange confidential or private data. In this setting …

[HTML][HTML] Supporting business process variability through declarative process families

H Groefsema, N van Beest - Computers in Industry, 2024 - Elsevier
Organizations use business process management systems to automate processes that they
use to perform tasks or interact with customers. However, several variants of the same …

Web service interaction modeling and verification using recursive composition algebra

GN Rai, GR Gangadharan… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The design principle of composability among Web services is one of the most crucial
reasons for the success and popularity of Web services. However, achieving error-free …