共 50 条
- [41] Action Patterns in Business Process Models [J]. SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 115 - +
- [42] A role-based process security model in business process management [J]. Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1596 - 1599
- [43] Design of Intelligent Business Process System and Process Remodeling [J]. INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL 1, PROCEEDINGS, 2008, : 589 - 593
- [44] A security engineering process based on patterns [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 734 - +
- [46] Enhancing business process management with simulation optimization [J]. PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 642 - +
- [48] Enhancing Mobile Device Security with Process Mining [J]. 2016 IEEE 14TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS (SISY), 2016, : 181 - 184
- [49] Secure Design Patterns for Security in Smart Metering Systems [J]. UKSIM-AMSS NINTH IEEE EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2015), 2015, : 278 - 283
- [50] Integrating Security Aspects into Business Process Models [J]. IT-INFORMATION TECHNOLOGY, 2013, 55 (06): : 239 - 245