An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints
From MaRDI portal
Publication:414857
Recommendations
- Business process verification with constraint temporal answer set programming
- Business process specification and analysis
- A formal framework for business process modelling and design
- A rigorous methodology for specification and verification of business processes
- Verifying business process compliance by reasoning about actions
Cites work
- scientific article; zbMATH DE number 3722109 (Why is no real title available?)
- scientific article; zbMATH DE number 1739888 (Why is no real title available?)
- scientific article; zbMATH DE number 1903365 (Why is no real title available?)
- scientific article; zbMATH DE number 2102731 (Why is no real title available?)
- A logic programming approach to knowledge-state planning, semantics and complexity
- A logic programming approach to knowledge-state planning. II: The DLV\(^\mathcal K\) system
- Comparing action descriptions based on semantic preferences
- Computer Aided Verification
- Delegation in role-based access control
- Extending and implementing the stable model semantics
- Information Security
- Knowledge Representation, Reasoning and Declarative Problem Solving
- Nonmonotonic causal theories
- Reasoning about effects of concurrent actions
- Reasoning web. Third international summer school 2007, Dresden, Germany, September 3--7, 2007. Tutorial lectures
- Representing Action Domains with Numeric-Valued Fluents
- Representing action and change by logic programs
- Representing the Zoo World and the Traffic World in the language of the Causal Calculator
- SAT-based planning in complex domains: Concurrency, constraints and nondeterminism
- STRIPS: A new approach to the application of theorem proving to problem solving
- Secure data management in decentralized systems
- The DLV system for knowledge representation and reasoning
Cited in
(4)
This page was built for publication: An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q414857)