-
1
-
-
84876359591
-
Auditing workflow executions against dataflow policies
-
Abramowicz, W., Tolksdorf, R. (eds.) BIS 2010. Springer, Heidelberg
-
Accorsi, R., Wonnemann, C.: Auditing workflow executions against dataflow policies. In: Abramowicz, W., Tolksdorf, R. (eds.) BIS 2010. LNBIP, vol. 47, pp. 207-217. Springer, Heidelberg (2010)
-
(2010)
LNBIP
, vol.47
, pp. 207-217
-
-
Accorsi, R.1
Wonnemann, C.2
-
2
-
-
79959293472
-
Strong non-leak guarantees for workflow models
-
ACM, New York
-
Accorsi, R., Wonnemann, C.: Strong non-leak guarantees for workflow models. In: ACM Symposium on Applied Computing, pp. 308-314. ACM, New York (2011)
-
(2011)
ACM Symposium on Applied Computing
, pp. 308-314
-
-
Accorsi, R.1
Wonnemann, C.2
-
3
-
-
0032027597
-
Modeling and analysis of workflows using Petri nets
-
Adam, N., Atluri, V., Huang, W.: Modeling and analysis of workflows using Petri nets. Journal of Intelligent Information Systems 10(2), 131-158 (1998)
-
(1998)
Journal of Intelligent Information Systems
, vol.10
, Issue.2
, pp. 131-158
-
-
Adam, N.1
Atluri, V.2
Huang, W.3
-
4
-
-
58049084581
-
Complying with compliance
-
Allman, E.: Complying with compliance. ACM Queue 4(7), 19-21 (2006)
-
(2006)
ACM Queue
, vol.4
, Issue.7
, pp. 19-21
-
-
Allman, E.1
-
5
-
-
0035750945
-
A Chinese Wall security model for decentralized workflow systems
-
ACM, New York
-
Atluri, V., Chung, S., Mazzoleni, P.: A Chinese Wall security model for decentralized workflow systems. In: ACM Conference on Computer and Communications Security, pp. 48-57. ACM, New York (2001)
-
(2001)
ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Atluri, V.1
Chung, S.2
Mazzoleni, P.3
-
6
-
-
84949747356
-
An authorization model for workflows
-
Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. Springer, Heidelberg
-
Atluri, V., Huang, W.: An authorization model for workflows. In: Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 44-64. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.2
-
7
-
-
0002539153
-
An extended Petri net model for supporting workflows in a multilevel secure environment
-
Chapman & Hall, Boca Raton
-
Atluri, V., Huang, W.: An extended Petri net model for supporting workflows in a multilevel secure environment. In: IFIP Conference Proceedings of Database Security, vol. 79, pp. 240-258. Chapman & Hall, Boca Raton (1996)
-
(1996)
IFIP Conference Proceedings of Database Security
, vol.79
, pp. 240-258
-
-
Atluri, V.1
Huang, W.2
-
8
-
-
70849107955
-
Verifying the interplay of authorization policies and workflow in service-oriented architectures
-
IEEE, Los Alamitos
-
Barletta, M., Ranise, S., Viganò, L.: Verifying the interplay of authorization policies and workflow in service-oriented architectures. In: Conference on Computational Science, vol. 3, pp. 289-296. IEEE, Los Alamitos (2009)
-
(2009)
Conference on Computational Science
, vol.3
, pp. 289-296
-
-
Barletta, M.1
Ranise, S.2
Viganò, L.3
-
9
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
Breaux, T., Antón, A.: Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering 34(1), 5-20 (2008)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.1
Antón, A.2
-
11
-
-
74049123448
-
Structural non-interference in elementary and trace nets
-
Busi, N., Gorrieri, R.: Structural non-interference in elementary and trace nets. Mathematical Structures in Computer Science 19(6), 1065-1090 (2009)
-
(2009)
Mathematical Structures in Computer Science
, vol.19
, Issue.6
, pp. 1065-1090
-
-
Busi, N.1
Gorrieri, R.2
-
12
-
-
80054077620
-
Wirtschaftskriminalität 2009 - Sicherheitslage in deutschen Großunternehmen
-
Bussmann, K.D., Krieg, O., Nestler, C., Salvenmoser, S., Schroth, A., Theile, A., Trunk, D.: Wirtschaftskriminalität 2009 - Sicherheitslage in deutschen Großunternehmen. In: Martin-Luther-Universität Halle-Wittenberg and PwC AG (2009)
-
(2009)
Martin-Luther-Universität Halle-Wittenberg and PwC AG
-
-
Bussmann, K.D.1
Krieg, O.2
Nestler, C.3
Salvenmoser, S.4
Schroth, A.5
Theile, A.6
Trunk, D.7
-
13
-
-
84974776068
-
A taxonomy of security properties for process algebras
-
Focardi, R., Gorrieri, R.: A taxonomy of security properties for process algebras. Journal of Computer Security 3(1), 5-34 (1995)
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-34
-
-
Focardi, R.1
Gorrieri, R.2
-
14
-
-
67650649695
-
Petri net security checker: Structural noninterference at work
-
Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. Springer, Heidelberg
-
Frau, S., Gorrieri, R., Ferigato, C.: Petri net security checker: Structural noninterference at work. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 210-225. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5491
, pp. 210-225
-
-
Frau, S.1
Gorrieri, R.2
Ferigato, C.3
-
15
-
-
34047142082
-
The process audit
-
Hammer, M.: The process audit. Harvard Business Review 85(4), 119-142 (2007)
-
(2007)
Harvard Business Review
, vol.85
, Issue.4
, pp. 119-142
-
-
Hammer, M.1
-
16
-
-
0001604985
-
Coloured Petri nets: A high level language for system design and analysis
-
Rozenberg, G. (ed.) APN 1990. Springer, Heidelberg
-
Jensen, K.: Coloured Petri nets: A high level language for system design and analysis. In: Rozenberg, G. (ed.) APN 1990. LNCS, vol. 483, pp. 342-416. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.483
, pp. 342-416
-
-
Jensen, K.1
-
18
-
-
0015672289
-
A note on the confinement problem
-
Lampson, B.: A note on the confinement problem. Communications of the ACM 16(10), 613-615 (1973)
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
19
-
-
43149123380
-
A feature-complete petri net semantics for WS-BPEL 2.0
-
Dumas, M., Heckel, R. (eds.) WS-FM 2007. Springer, Heidelberg
-
Lohmann, N.: A feature-complete petri net semantics for WS-BPEL 2.0. In: Dumas, M., Heckel, R. (eds.) WS-FM 2007. LNCS, vol. 4937, pp. 77-91. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4937
, pp. 77-91
-
-
Lohmann, N.1
-
20
-
-
70349373797
-
Petri net transformations for business processes - A survey
-
Jensen, K., van der Aalst, W.M.P. (eds.) Transactions on Petri Nets and Other Models of Concurrency II. Springer, Heidelberg
-
Lohmann, N., Verbeek, E., Dijkman, R.: Petri net transformations for business processes - A survey. In: Jensen, K., van der Aalst, W.M.P. (eds.) Transactions on Petri Nets and Other Models of Concurrency II. LNCS, vol. 5460, pp. 46-63. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5460
, pp. 46-63
-
-
Lohmann, N.1
Verbeek, E.2
Dijkman, R.3
-
22
-
-
77951442815
-
Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten
-
Müller, G., Accorsi, R., Höhn, S., Sackmann, S.: Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten. Informatik Spektrum 33(1), 3-13 (2010)
-
(2010)
Informatik Spektrum
, vol.33
, Issue.1
, pp. 3-13
-
-
Müller, G.1
Accorsi, R.2
Höhn, S.3
Sackmann, S.4
-
23
-
-
38149023379
-
Using control patterns in business processes compliance
-
Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE Workshops 2007. Springer, Heidelberg
-
Namiri, K., Stojanovic, N.: Using control patterns in business processes compliance. In: Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE Workshops 2007. LNCS, vol. 4832, pp. 178-190. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4832
, pp. 178-190
-
-
Namiri, K.1
Stojanovic, N.2
-
24
-
-
33744958417
-
WofBPEL: A tool for automated analysis of BPEL processes
-
DOI 10.1007/11596141-37, Service-Oriented Computing, ICSOC 2005 - Third International Conference, Proceedings
-
Ouyang, C., Verbeek, E., van der Aalst, W.M., Breutel, S., Dumas, M., ter Hofstede, A.H.: WofBPEL: A tool for automated analysis of BPEL processes. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol. 3826, pp. 484-489. Springer, Heidelberg (2005) (Pubitemid 43856207)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3826 LNCS
, pp. 484-489
-
-
Ouyang, C.1
Verbeek, E.2
Van Der, A.W.M.P.3
Breutel, S.4
Dumas, M.5
Ter, H.A.H.M.6
-
26
-
-
0034829266
-
Non-interference: Who needs it?
-
IEEE, Los Alamitos
-
Ryan, P., McLean, J., Millen, J., Gligor, V.: Non-interference: Who needs it? In: IEEE Computer Security FoundationsWorkshop, pp. 237-238. IEEE, Los Alamitos (2001)
-
(2001)
IEEE Computer Security FoundationsWorkshop
, pp. 237-238
-
-
Ryan, P.1
McLean, J.2
Millen, J.3
Gligor, V.4
-
28
-
-
33847060397
-
Formulating the data-flow perspective for business process management
-
Sun, S., Zhao, L., Nunamaker, J., Sheng, O.L.: Formulating the data-flow perspective for business process management. Information Systems Research 17(4), 374-391 (2006)
-
(2006)
Information Systems Research
, vol.17
, Issue.4
, pp. 374-391
-
-
Sun, S.1
Zhao, L.2
Nunamaker, J.3
Sheng, O.L.4
-
29
-
-
69849089733
-
Data-flow anti-patterns: Discovering data-flow errors in workflows
-
van Eck, P., Gordijn, J., Wieringa, R. (eds.) CAiSE 2009. Springer, Heidelberg
-
Trčka, N., van der Aalst, W., Sidorova, N.: Data-flow anti-patterns: Discovering data-flow errors in workflows. In: van Eck, P., Gordijn, J., Wieringa, R. (eds.) CAiSE 2009. LNCS, vol. 5565, pp. 425-439. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5565
, pp. 425-439
-
-
Trčka, N.1
Van Der Aalst, W.2
Sidorova, N.3
-
30
-
-
38049066016
-
Satisfiability and resiliency in workflow systems
-
Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
-
Wang, Q., Li, N.: Satisfiability and resiliency in workflow systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 90-105. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 90-105
-
-
Wang, Q.1
Li, N.2
-
31
-
-
79960714048
-
The state of business process management
-
Wolf, C., Harmon, P.: The state of business process management. BPTrends Report (2010), http://www.bptrends.com/
-
(2010)
BPTrends Report
-
-
Wolf, C.1
Harmon, P.2
-
32
-
-
77955303801
-
Information flow analysis of scientific workflows
-
Yang, P., Lu, S., Gofman, M., Yang, Z.: Information flow analysis of scientific workflows. Journal of Computer and System Sciences 76, 390-402 (2009)
-
(2009)
Journal of Computer and System Sciences
, vol.76
, pp. 390-402
-
-
Yang, P.1
Lu, S.2
Gofman, M.3
Yang, Z.4
|