共 50 条
[21]
Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security
[J].
ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2020,
:281-288
[23]
Verification of Business Process Entailment Constraints Using SPIN
[J].
ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS,
2009, 5429
:1-+
[25]
Verification of BPMN 2.0 process models: An event log-based approach
[J].
INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERIS/PROJMAN / HCIST 2016,
2016, 100
:1064-1070
[26]
Improving Quality of Business Process Models
[J].
EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2011,
2013, 275
:130-144
[27]
Deriving Collaborative Models from Business Process Models
[J].
2011 6TH COLOMBIAN COMPUTING CONGRESS (CCC),
2011,
[30]
An Approach for Extracting Business Vocabularies from Business Process Models
[J].
INFORMATION TECHNOLOGY AND CONTROL,
2013, 42 (02)
:178-190