Part 2: Full PapersInternational audienceIn a SOA context, enterprises can use workflow technologies to orchestrate available business processes and their corresponding services and apply business rules or policies to control how they can be used and who can use them. This approach becomes a bit more complex when a set of business processes includes services that derive outside the company’s domain and therefore can be difficult to align with existing rules/policies. In the privacy and security domain, access control and policy languages are used to define what actions can be performed on resources, by whom, for what purpose and in what context. In this paper we propose an approach for dealing with the inclusion of internal and/or external ...
Part 2: Access Control and AuthorizationInternational audienceTo support the re-use of business proc...
The business processes of an organisation are executed in certain boundaries. Some of the restrictio...
textabstractRecognizing the importance of privacy management as a business process and a business su...
We propose an abstract model of business processes for the purpose of (i) evaluating privacy policy ...
Part 4: Data Access, Security and PrivacyInternational audienceNowadays European context is introduc...
Privacy has not been researched or investigated from business process management perspective and the...
The design of systems capable of protecting users' privacy is a challenging endeavour. Since users a...
Service-oriented architectures (SOA), and in particular Web services, have quickly become a popular ...
Part 4: PoliciesInternational audienceThis paper argues that privacy policies in SOA needs a lifecyc...
Business process models can involve numerous operational activities for collecting, processing and e...
Compliance to regulatory requirements is key to successful collaborative business process execution....
The protection of customer privacy is a fundamental issue in today’s corporate marketing strategies....
The collection and long-term retention of excessive data enables organisations to process data for i...
Privacy is a prime concern in today’s information society. To protect the privacy of individuals, en...
Privacy is a prime concern in today's information society. To protect the privacy of individuals, en...
Part 2: Access Control and AuthorizationInternational audienceTo support the re-use of business proc...
The business processes of an organisation are executed in certain boundaries. Some of the restrictio...
textabstractRecognizing the importance of privacy management as a business process and a business su...
We propose an abstract model of business processes for the purpose of (i) evaluating privacy policy ...
Part 4: Data Access, Security and PrivacyInternational audienceNowadays European context is introduc...
Privacy has not been researched or investigated from business process management perspective and the...
The design of systems capable of protecting users' privacy is a challenging endeavour. Since users a...
Service-oriented architectures (SOA), and in particular Web services, have quickly become a popular ...
Part 4: PoliciesInternational audienceThis paper argues that privacy policies in SOA needs a lifecyc...
Business process models can involve numerous operational activities for collecting, processing and e...
Compliance to regulatory requirements is key to successful collaborative business process execution....
The protection of customer privacy is a fundamental issue in today’s corporate marketing strategies....
The collection and long-term retention of excessive data enables organisations to process data for i...
Privacy is a prime concern in today’s information society. To protect the privacy of individuals, en...
Privacy is a prime concern in today's information society. To protect the privacy of individuals, en...
Part 2: Access Control and AuthorizationInternational audienceTo support the re-use of business proc...
The business processes of an organisation are executed in certain boundaries. Some of the restrictio...
textabstractRecognizing the importance of privacy management as a business process and a business su...