Term-weighting approaches in automatic text retrieval
Information Processing and Management: an International Journal
Lexical analysis and stoplists
Information retrieval
On finding the strongly connected components in a directed graph
Information Processing Letters
An algorithm for suffix stripping
Readings in information retrieval
A vector space model for automatic indexing
Communications of the ACM
Formal Concept Analysis: Mathematical Foundations
Formal Concept Analysis: Mathematical Foundations
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Towards a formal framework for reuse in business process modeling
BPM'07 Proceedings of the 2007 international conference on Business process management
An Approach for Producing Privacy-Aware Reusable Business Process Fragments
ICWS '12 Proceedings of the 2012 IEEE 19th International Conference on Web Services
Hi-index | 0.00 |
Two major concerns are emerging, while dealing with building new process functionalities: shortening the development periods and eliminating the risks related to sensitive information leakages and privacy breaches. Indeed, managing business processes in a modern fashion may increase their quality. An effective solution consists in reusing specific fragments of existing business processes. Moreover, the produced fragments need to be declared as safe from a privacy perspective. This paper presents a design-time approach to decomposing existing business processes. This approach provides ready-for-reuse and privacy-aware fragments that are conform to given semantics specifications. It is based on the so-called FCA technique handling semantic clustering while dealing with the privacy constraints.