@inproceedings{f20401ec7e4445bf9053f3d829ed3f6c,
title = "Process decomposition based on semantics and privacy-aware requirements-driven approach",
abstract = "Two major concerns are emerging, while dealing with building new process functionalities: shortening the development periods and eliminating the risks related to sensitive information leakages and privacy breaches. Indeed, managing business processes in a modern fashion may increase their quality. An effective solution consists in reusing specific fragments of existing business processes. Moreover, the produced fragments need to be declared as safe from a privacy perspective. This paper presents a design-time approach to decomposing existing business processes. This approach provides ready-for-reuse and privacy-aware fragments that are conform to given semantics specifications. It is based on the so-called FCA technique handling semantic clustering while dealing with the privacy constraints.",
keywords = "Business Process, Fragmentation, Privacy, Requirements-Driven, Reuse, Semantics",
author = "Zemni, \{Mohamed Anis\} and Hadj-Alouane, \{Nejib Ben\} and Amel Mammar",
year = "2013",
month = dec,
day = "1",
doi = "10.1145/2539150.2539258",
language = "English",
isbn = "9781450321136",
series = "ACM International Conference Proceeding Series",
pages = "654--657",
booktitle = "Proceedings - 15th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2013",
note = "15th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2013 ; Conference date: 02-12-2013 Through 04-12-2013",
}