-
1
-
-
79959293472
-
Strong nonleak guarantees for workflow models
-
Accorsi R, Wonnemann C (2011) Strong nonleak guarantees for workflow models. ACM, SACS, S. 308-314
-
(2011)
ACM, SACS
-
-
Accorsi, R.1
Wonnemann, C.2
-
3
-
-
84862876552
-
-
BDSG, German Federal Ministry of Justice
-
BDSG (2009) Bundesdatenschutzgesetz. German Federal Ministry of Justice
-
(2009)
Bundesdatenschutzgesetz
-
-
-
4
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
DOI 10.1109/TSE.2007.70746
-
Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Software Eng 34(1):5-20 (Pubitemid 351343899)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Anton, A.I.2
-
6
-
-
84893581243
-
Hints on howto face business process compliance
-
In: Resinas M, Ruiz-Cortés A, Pastor JA, SanchoMR (Hrsg)
-
Cabanillas C, Resinas M, Ruiz-Cortés A (2010) Hints on howto face business process compliance. In: Resinas M, Ruiz-Cortés A, Pastor JA, SanchoMR (Hrsg) Proc JISBD 4, S 26-32
-
(2010)
Proc JISBD
, vol.4
-
-
Cabanillas, C.1
Resinas, M.2
Ruiz-Cortés, A.3
-
7
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
ACM, New York
-
Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J (2009) Controlling data in the cloud: Outsourcing computation without outsourcing control. In: Proc 2009 ACM workshop on cloud computing security. ACM, New York, S 85-90
-
(2009)
Proc 2009 ACM Workshop on Cloud Computing Security
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
8
-
-
80051793403
-
-
COMPAS, EU FP7 Project 215175, deliverable 2.1, State of the art in the field of compliance languages
-
COMPAS (2008) Compliance-driven models, languages, and architectures for services. EU FP7 Project 215175, deliverable 2.1State of the art in the field of compliance languages
-
(2008)
Compliance-Driven Models, Languages, and Architectures for Services
-
-
-
9
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing
-
CSA, Abruf am 2010-06-29
-
CSA (2009) Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance. http://www. cloudsecurityalliance.org/. Abruf am 2010-06-29
-
(2009)
Cloud Security Alliance
-
-
-
10
-
-
77954695824
-
Top threats to cloud computing
-
CSA, Abruf am 2010-06-29
-
CSA (2010) Top threats to cloud computing. Cloud Security Alliance. http://www. cloudsecurityalliance.org/. Abruf am 2010- 06-29
-
(2010)
Cloud Security Alliance
-
-
-
13
-
-
84864560148
-
Measuring similarity between semantic business processmodels
-
Ehrig M, Koschmider A, Oberweis A (2007) Measuring similarity between semantic business processmodels. ACS CRPIT 67:71-80
-
(2007)
ACS CRPIT
, vol.67
, pp. 71-80
-
-
Ehrig, M.1
Koschmider, A.2
Oberweis, A.3
-
14
-
-
77957895284
-
The economic impact of cloud computing on business creation, employment and output in Europe
-
Etro F (2009) The economic impact of cloud computing on business creation, employment and output in Europe. Review of Business and Economics 54(2):179-218
-
(2009)
Review of Business and Economics
, vol.54
, Issue.2
, pp. 179-218
-
-
Etro, F.1
-
16
-
-
78951495298
-
Cloud computing - benefits, risks and recommendations for information security
-
ENISA
-
ENISA (2009) Cloud computing - benefits, risks and recommendations for information security. European Network Information and Security Agency
-
(2009)
European Network Information and Security Agency
-
-
-
18
-
-
80051786682
-
Gramm-leach-bliley act
-
GLB
-
GLB (1999) Gramm-Leach-Bliley Act. In: Congress of the USA
-
(1999)
Congress of the USA
-
-
-
19
-
-
67649921330
-
Detecting regulatory compliance for business processmodels through semantic annotations
-
Governatori G, Hoffmann J, Sadiq SW,Weber I (2009) Detecting regulatory compliance for business processmodels through semantic annotations. Springer LNBPI 14:5-17
-
(2009)
Springer LNBPI
, vol.14
, pp. 5-17
-
-
Governatori, G.1
Hoffmann, J.2
Sadiq, S.W.3
Weber, I.4
-
20
-
-
85024260157
-
Cloud computing
-
Hayes B (2009) Cloud computing. CommACM 51(7):9-11
-
(2009)
CommACM
, vol.51
, Issue.7
, pp. 9-11
-
-
Hayes, B.1
-
21
-
-
80051794669
-
Health insurance portability and accountability act
-
HIPAA
-
HIPAA (1996) Health insurance portability and accountability act. In: Congress of the USA
-
(1996)
Congress of the USA
-
-
-
22
-
-
72949119514
-
Model-based reasoning on the achievement of business goals
-
ACM, New York
-
Höhn S (2009) Model-based reasoning on the achievement of business goals. In: ACM symposium on applied computing. ACM, New York, S 1589-1593
-
(2009)
ACM Symposium on Applied Computing
-
-
Höhn, S.1
-
24
-
-
84856262444
-
BW2PN: BPEL+WSDL to Petri net transformation. Software tool developed at the University of Freiburg
-
IIG, Abruf am 2010-06-29
-
IIG (2010) BW2PN: BPEL+WSDL to Petri net transformation. Software tool developed at the University of Freiburg, IIG Telematics. http://www.telematik. uni-freiburg.de/ comcert/. Abruf am 2010-06-29
-
(2010)
IIG Telematics
-
-
-
26
-
-
0015672289
-
A note on the confinement problem
-
Lampson B (1973) A note on the confinement problem. Commun ACM 16(10):613-615
-
(1973)
Commun ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
27
-
-
34247861351
-
A static compliance-checking framework for business process models
-
DOI 10.1147/sj.462.0335
-
Liu Y, Müller S, Xu K (2007) A static compliance-checking approach framework for business process models. IBM System Journal 46(2):335-361 (Pubitemid 46915268)
-
(2007)
IBM Systems Journal
, vol.46
, Issue.2
, pp. 335-361
-
-
Liu, Y.1
Muller, S.2
Xu, K.3
-
32
-
-
84882944120
-
Verifying business rules using a SMT solver for BPEL processes
-
Monakova G, Kopp O, Leymann F, Moser S, Schäfers K (2009) Verifying business rules using a SMT solver for BPEL processes. GI LNI 147:81-94
-
(2009)
GI LNI
, vol.147
, pp. 81-94
-
-
Monakova, G.1
Kopp, O.2
Leymann, F.3
Moser, S.4
Schäfers, K.5
-
33
-
-
0024645936
-
Petri nets: Properties, analysis and applications
-
Murata T (1989) Petri nets: Properties, analysis and applications. Proc IEEE 77(4):541-580
-
(1989)
Proc IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
35
-
-
84856293412
-
-
Oryx Abruf am 2010-06-29
-
Oryx (2010) The Oryx project. http://bpt.hpi. uni-potsdam.de/Oryx/ WebHome. Abruf am 2010-06-29
-
The Oryx project
-
-
-
36
-
-
33744958417
-
-
Springer LNCS
-
Ouyang C, Verbeek E, van der Aalst WMP, Breutel S, Dumas M, ter Hofstede AHM (2005) WofBPEL: A tool for automated analysis of BPEL processes. Springer LNCS 3826:484-489
-
(2005)
WofBPEL: A Tool for Automated Analysis of BPEL Processes
, vol.3826
, pp. 484-489
-
-
Ouyang, C.1
Verbeek, E.2
Van Der Aalst, W.M.P.3
Breutel, S.4
Dumas, M.5
Ter Hofstede, A.H.M.6
-
38
-
-
33748543201
-
Distributed usage control
-
DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
-
Pretschner A, Hilty M, Basin D (2006) Distributed usage control. Comm ACM 49:39-44 (Pubitemid 44371759)
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
39
-
-
38049150939
-
Modeling control objectives for business process compliance
-
Springer LNCS
-
Sadiq S, Governatori G, Namiri K (2007) Modeling control objectives for business process compliance. Business Process Management. Springer LNCS 4714:149-164
-
(2007)
Business Process Management
, vol.4714
, pp. 149-164
-
-
Sadiq, S.1
Governatori, G.2
Namiri, K.3
-
40
-
-
84856533305
-
A hitchhiker's guide to galaxy aka
-
Abruf am 2010-06-29
-
Saha D (2008) A hitchhiker's guide to galaxy a.k.a. Netweaver business process modelling. http://www.sdn.sap.com/irj/scn/ weblogs?blog=/pub/wlg/10947. Abruf am 2010-06-29
-
(2008)
Netweaver Business Process Modelling
-
-
Saha, D.1
-
41
-
-
84881225236
-
Enforceable security policies
-
Schneider F (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3(1):30-50
-
(2000)
ACM Trans Inf Syst Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.1
-
42
-
-
84856539653
-
Sarbanes-Oxley act
-
SOX
-
SOX (2002) Sarbanes-Oxley act. In: Congress of the USA
-
(2002)
Congress of the USA
-
-
-
43
-
-
0035627978
-
Workflow automation: Overview and research issues
-
Stohr EA, Zhao JL (2001) Workflow automation: Overview and research issues. Information Systems Frontiers 3(3):281-296
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
, pp. 281-296
-
-
Stohr, E.A.1
Zhao, J.L.2
-
47
-
-
0002719897
-
The application of Petri nets to workflow management
-
van der Aalst WMP (1998) The application of Petri nets to workflow management. Journal of Circuits, Systems, and Computers 8(1):21-66 (Pubitemid 128540249)
-
(1998)
Journal of Circuits, Systems and Computers
, vol.8
, Issue.1
, pp. 21-66
-
-
Van Der Aalst, W.M.P.1
-
48
-
-
33646145999
-
Challenges in business process management: Verification of business processing using Petri nets
-
van der Aalst WMP (2003) Challenges in business process management: Verification of business processing using Petri nets. Bulletin of the EATCS 80:174-199
-
(2003)
Bulletin of the EATCS
, vol.80
, pp. 174-199
-
-
Van Der Aalst, W.M.P.1
-
49
-
-
34249010560
-
Verification of the SAP reference models using EPC reduction, state-space analysis, and invariants
-
DOI 10.1016/j.compind.2007.01.001, PII S0166361507000176
-
van Dongen BF, Jansen-Vullers MH, Verbeek HMW, van der Aalst WMP (2007) Verification of the SAP referencemodels using EPC reduction, state-space analysis, and invariants. Computers in Industry 58(6):578-601 (Pubitemid 46802841)
-
(2007)
Computers in Industry
, vol.58
, Issue.6
, pp. 578-601
-
-
Van Dongen, B.F.1
Jansen-Vullers, M.H.2
Verbeek, H.M.W.3
Van Der Aalst, W.M.P.4
-
50
-
-
85135370435
-
Howto design a general rule markup language
-
Wagner G (2002) Howto design a general rule markup language. GI LNI 14:19-37
-
(2002)
GI LNI
, vol.14
, pp. 19-37
-
-
Wagner, G.1
|