Literature review

Instructions

2750 word literature review - Literature Review on Privacy preserving service based business processes (BPMN) in Distributed Service SystemAn argumentative discussion of the existing work on this area pointing out the strong points and the gaps.The aims and objectives are in the attached document pointing the work so far, which is attached.The literature review should be divided into sections that will discuss the existing work that points out the gap that will be addressed in the research.Sections could be for example:- Work in addressing privacy requirements in BPMN - Extensions to BPMN       -notational extensions      - non notational extension - Reasoning and model checking privacy aware BPMN - Transformation between privacy aware BPMN and BPEL - Enforcements of the privacy requirements during run time of BPMNThe execution language will be use is BPEL and the modelling language extensions they used is meta model extension. They developed an ontology using OWL DL and extended it with SWRL to represent the privacy requirements.Focus on PRIVACY not security, they are two very different concepts.- Privacy related requirements and visual notational extensions to BPMN (Design time) - Reasoning and mode checking privacy aware or preserving extension to BPMN - Enformcement of the privacy aware requirements during run time of BPMNPlease see the attached file as a guide.This is part of a dissertation, with no overall specified fixed length.I have provided a document shows an example of how the literature show be wrote in an argumentative way, I have also provided some references that should be useful Attached is the work that has been done so far but it is not at the level of literature review they require because it lacks the arguments and pointing to the research gap. I provided the aim and objectives and the requirements that they have developed for their research to help the writer know what research gap they are looking at.

Answer

Computer scienceStudent name:Institution affiliation:Date:IntroductionIn the recent past, the distributed mobile application has increasing being considered as a real solution that has brought the robustness as well as the performance benefits. It has been witnessed more in the fields such as the emergency response system which has rendered inoperative the conventional centralize ICT infrastructure. The nature of the informational intensive of such systems leads to the fore importance of the distribution of the data through the use of the workflow channel in conditions of short scales and the data privacy.Due to the increase of both the manmade and natural calamities, the development and modeling of the emergency response system are being adopted as a priority for the corporations and the...

To avoid plagiarism, part of the answer is hidden. Click on the button below to order the full answer.
Order Answer Back
Price Calculator
Manage orders
Why we are Ranked the best
  • Unlimited Revisions
  • Free 24/7 Support and chat
  • Money back guaranteed
  • Low prices with discounts
  • Experienced writers.
  • Free Unlimited support

Hear from our customers

Get a quote Chat with support Find an expert Frequently asked questions