Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2017
Mining Resource Profiles from Event Logs
- Anastasiia Pika,
- Michael Leyer,
- Moe T. Wynn,
- Colin J. Fidge,
- Arthur H. M. Ter Hofstede,
- Wil M. P. Van Der Aalst
ACM Transactions on Management Information Systems (TMIS), Volume 8, Issue 1Article No.: 1, Pages 1–30https://doi.org/10.1145/3041218In most business processes, several activities need to be executed by human resources and cannot be fully automated. To evaluate resource performance and identify best practices as well as opportunities for improvement, managers need objective ...
- articleJanuary 1994
The management of computer security profiles using a role-oriented approach
Computers and Security (CSEC), Volume 13, Issue 8Pages 673–680Usually, add-on security packages implement and manage access control via 'profiles', where a profile defines a set of users or resources. This paper discusses the concept of a 'role profile', where such a profile is linked to a specific (business) role ...