Process Decomposition Based on Semantics and Privacy-Aware Requirements-Driven Approach

  • Authors:
  • Mohamed Anis Zemni;Nejib Ben Hadj-Alouane;Amel Mammar

  • Affiliations:
  • Ecole Nationale des Sciences de l'Informatique, ENSI, Campus Universitaire de la, Manouba 2010 Manouba, Tunisia;Ecole Nationale d'Ingénieurs de Tunis, ENIT, BP 37, Le Belvedere, 1002 Tunis, Tunisia nejib;Telecom SudParis, 9 Rue Charles Fourier, 91011 Evry, FRANCE

  • Venue:
  • Proceedings of International Conference on Information Integration and Web-based Applications & Services
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Two major concerns are emerging, while dealing with building new process functionalities: shortening the development periods and eliminating the risks related to sensitive information leakages and privacy breaches. Indeed, managing business processes in a modern fashion may increase their quality. An effective solution consists in reusing specific fragments of existing business processes. Moreover, the produced fragments need to be declared as safe from a privacy perspective. This paper presents a design-time approach to decomposing existing business processes. This approach provides ready-for-reuse and privacy-aware fragments that are conform to given semantics specifications. It is based on the so-called FCA technique handling semantic clustering while dealing with the privacy constraints.