Process decomposition based on semantics and privacy-aware requirements-driven approach

  • Mohamed Anis Zemni
  • , Nejib Ben Hadj-Alouane
  • , Amel Mammar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Two major concerns are emerging, while dealing with building new process functionalities: shortening the development periods and eliminating the risks related to sensitive information leakages and privacy breaches. Indeed, managing business processes in a modern fashion may increase their quality. An effective solution consists in reusing specific fragments of existing business processes. Moreover, the produced fragments need to be declared as safe from a privacy perspective. This paper presents a design-time approach to decomposing existing business processes. This approach provides ready-for-reuse and privacy-aware fragments that are conform to given semantics specifications. It is based on the so-called FCA technique handling semantic clustering while dealing with the privacy constraints.

Original languageEnglish
Title of host publicationProceedings - 15th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2013
Pages654-657
Number of pages4
DOIs
Publication statusPublished - 1 Dec 2013
Event15th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2013 - Vienna, Austria
Duration: 2 Dec 20134 Dec 2013

Publication series

NameACM International Conference Proceeding Series

Conference

Conference15th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2013
Country/TerritoryAustria
CityVienna
Period2/12/134/12/13

Keywords

  • Business Process
  • Fragmentation
  • Privacy
  • Requirements-Driven
  • Reuse
  • Semantics

Fingerprint

Dive into the research topics of 'Process decomposition based on semantics and privacy-aware requirements-driven approach'. Together they form a unique fingerprint.

Cite this