Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes
BPM '09 Proceedings of the 7th International Conference on Business Process Management
Satisfaction of Control Objectives by Control Processes
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
Monitoring unmanaged business processes
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Approaches towards dealing with complex systems configuration
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems
Visualizing meetings as a graph for more accessible meeting artifacts
CHI '11 Extended Abstracts on Human Factors in Computing Systems
A mediator-based system for distributed semantic provenance management systems
Proceedings of the 16th International Database Engineering & Applications Sysmposium
Data flow-oriented process mining to support security audits
ICSOC'11 Proceedings of the 2011 international conference on Service-Oriented Computing
Monitoring SOA-based applications with business provenance
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Information and Software Technology
Hi-index | 0.00 |
Today's enterprise applications span multiple systems and organizations, integrating legacy and newly developed software components to deliver value to business operations. Often business processes rely on human activities that may not be predicted in advance, and information exchange is heavily based on e-mails or attachments where the content is unstructured and needs discovery. Visibility of such end-to-end operations is required to manage compliance and business performance. Hence, it becomes necessary to develop techniques for tracking and correlating the relevant aspects of business operations as needed without the cost and overhead of a fully fledged data and process reengineering. Our business provenance solution provides a generic data model and middleware infrastructure to collect and correlate information about how data was produced, what resources were involved and which tasks were executed. Business provenance gives the flexibility to selectively capture information required to address a specific compliance or performance goal. Additionally, a powerful correlation mechanism yields a representation of the end-to-end operation that puts each business artifact into the right context, for example, to detect situations of compliance violations and find their root causes.