Showing 17 open source projects for "business process modelling"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    Digital Signer (a PDF Signing software)

    Digital Signer (a PDF Signing software)

    Digital Signature & eSigning software. Bulk PDF signing. Sign all Page

    Digital Signer is a powerful and user-friendly software designed to secure and sign your digital documents with ease. Ideal for Tender filling, individuals, businesses, and professionals, this software ensures that your sensitive documents are protected from unauthorized editing and tampering, maintaining their integrity and authenticity. Key Features Sign PDFs with Hardware Devices: Ensuring the highest level of security. Digital Signature Certificates (DSC): Apply digital...
    Downloads: 42 This Week
    Last Update:
    See Project
  • 2
    CSRmanage

    CSRmanage

    Centralized vetting and records of Certificate Signing Requests (CSRs)

    CSRmanage is an application that can be used to validate CSRs (Certificate Signing Requests) and store them along with anciliary information about the personnel involved with CSRs and certificate installations and approvals. CSR evaluation is configurable/very strict. With adequate configuration, CSRmanage may save organizations time and money by ensuring that CSRs to be submitted are formatted corrrectly and conform to organizational network/I.T/DNS naming conventions. It can also...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    StrongKey CryptoEngine

    StrongKey CryptoEngine

    FIDO strong authentication, encryption, digital signature engine

    StrongKey CryptoEngine (SKCE) 2.0 is a "crypto Swiss Army knife" server to perform cryptographic functions through web services, while freeing application developers to focus on business functionality. Its modules include: - A FIDO Engine to support FIDO U2F key registrations/authentications - An encryption engine to encrypt/decrypt files using AES/TDES keys - Escrowing keys to on-premises key management system (StrongAuth KeyAppliance/SAKA) - Integration to cloud storage services (AWS S3, Azure and Eucalyptus Walrus) - A signing engine to digitally sign documents, code, etc. with FIPS 140-2 HSM support - An LDAP Engine for AD/LDAP integration for authorization decisions SKCE is battle-tested and in production at one of the largest e-commerce companies in the world, protecting more than 50M documents within the business process; see http://bit.ly/14VPYlO for the case study. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Bias :: Versatile Information Manager
    Bias is a cross-platform versatile information management application / Organizer
    Downloads: 1 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5

    Personal Productivity Tool

    Time tracking and recording multiple screens and keystrokes

    Enables multiple screen capture and key stroke recording. Not meant to run hidden but is for tracking personal productivity where an individual requires time-sheets to be filled in or to track activity for playback and recovery automatically. Does not connect over the network or try upload any files. All capture is local and virus free. This is meant to be a productivity tracker and not a key logging tool on other users machines. That is why it is not a service and not hidden. Refer to the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Cibet
    The cibet framework provides developers with functionality of the following topics: - Dual Control (4-Eyes Principle ...) - Extended Authorisation (Enhance Spring Security, Apache Shiro ...) - Extended Logging (Archiving, tracking, Redo, Restore ...)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SWAT

    SWAT

    Security Workflow Analysis Tool

    The Security Workflow Analysis Tool (SWAT) is a platform for modelling and analyzing workflows. It comes with ananlysis approaches to search for data leaks in workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SecSy: Security-oriented Log Synthesis

    SecSy: Security-oriented Log Synthesis

    Tool for synthesizing business process logs.

    SecSy is a tool for security-oriented log synthesis. Besides basic synthesis properties (cases per day, office hours, randomized activity duration, ...), its detailed parameter setting for simulating business processes also allows to specify data usage (objects + access modality), actors for process activities and access control constraints for task/object permissions. It is also capable of enforcing/violating specific security properties on process traces, such as SoD/BoD, Unauthorized Access, Corrupted log entries, Skipped Activities. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SEWOL: Security-oriented Workflow Lib

    SEWOL: Security-oriented Workflow Lib

    Java Library for workflow handling

    SEWOL provides support for the handling of workflow traces. It allows to specify the shape and content of process traces in terms of entries representing the execution of a specific workflow activity. Currently it supports plain text, Petrify, MXML and XES log file types. In order to specify security-related context information, SEWOL provides access control models such as access control lists (ACL) and role-based access control models (RBAC). SEWOL uses and encloses the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    egrsa

    egrsa

    rsa-elgamal comparison

    compare time of process between rsa and elgamal algorithm used to encryption and digital signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    FLAG was designed to simplify the process of log file analysis and forensic investigations. FLAG facilitates efficient analysis of large quantities of data within an interactive environment. PyFlag is the reimplementation of FLAG in Python.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring. This tool is intended to be helpful for security researchers and malware analysts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Program Killer is a Delphi 6 program that monitors the Process List on Windows 95/98/Me and Windows NT4/2000/XP for unauthorized EXE files (User Definable) and if found, those Processes are Terminated via the Windows API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ITkeys automates the security management process for Windows networks (Active Directory groups). Delegates the ability to amend relevant IT access for employees to their managers. Wizzard based web tool requiring no formal training. No more ADUC MMC!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Turn-key secure credit card processing appliance
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    BP-Sim

    BP-Sim

    EFT simulator

    BP-Sim allows users to perform an extensive range of tests across the chain of payment services and thus identify potential causes of failures before launching payment systems into production. BP-Sim consists of following modules: BP-Source, BP-Host, BP-HSM and BP-SeeEMV. BP-Source and BP-Host are payment transaction simulators supporting formats as: APACS30, AS2805, many ISO8583 dialects, IFSF, SPDH, TCMP. Together with industry-standard cryptography, multi-platform support, configurable...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB