-
1
-
-
79959293472
-
Strong non-leak guarantees for workflow models
-
ACM
-
R. Accorsi and C. Wonnemann. Strong non-leak guarantees for workflow models. In Symp. on Applied Computing, pages 308-314. ACM, 2011.
-
(2011)
Symp. on Applied Computing
, pp. 308-314
-
-
Accorsi, R.1
Wonnemann, C.2
-
2
-
-
80455144533
-
SWAT: A security workflow toolkit for reliably secure process-aware information systems
-
IEEE
-
R. Accorsi, C. Wonnemann, and S. Dochow. SWAT: A security workflow toolkit for reliably secure process-aware information systems. In Conf. on Availability, Reliability and Security, pages 692-697. IEEE, 2011.
-
(2011)
Conf. on Availability, Reliability and Security
, pp. 692-697
-
-
Accorsi, R.1
Wonnemann, C.2
Dochow, S.3
-
7
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
R. Botha and J. Eloff. Separation of duties for access control enforcement in workflow environments. IBM Systems J., 40(3):666-682, 2001. (Pubitemid 32933424)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
9
-
-
34548317524
-
IT audit: A critical business process
-
A. Carlin and F. Gallegos. IT audit: A critical business process. IEEE Computer, 40(7):87-89, 2007.
-
(2007)
IEEE Computer
, vol.40
, Issue.7
, pp. 87-89
-
-
Carlin, A.1
Gallegos, F.2
-
11
-
-
0039372661
-
Viewing business-processes security from different perspectives
-
G. Herrmann and G. Pernul. Viewing business-processes security from different perspectives. Int'l J. of Electronic Commerce, 3(3):89-103, 1999.
-
(1999)
Int'l J. of Electronic Commerce
, vol.3
, Issue.3
, pp. 89-103
-
-
Herrmann, G.1
Pernul, G.2
-
12
-
-
79960305817
-
Does process mining add to internal auditing?
-
M. Jans, B. Depaire, and K. Vanhoof. Does process mining add to internal auditing?. In BMMDS/EMMSAD '11, pages 31-45, 2011.
-
(2011)
BMMDS/EMMSAD '11
, pp. 31-45
-
-
Jans, M.1
Depaire, B.2
Vanhoof, K.3
-
13
-
-
77049104323
-
A framework for internal fraud risk reduction at it integrating business processes
-
M. Jans, N. Lybaert, K. Vanhoof, and J. van der Werf. A framework for internal fraud risk reduction at it integrating business processes. In Int'l J. of Digital Accounting Research, volume 9, pages 1-29, 2009.
-
(2009)
Int'l J. of Digital Accounting Research
, vol.9
, pp. 1-29
-
-
Jans, M.1
Lybaert, N.2
Vanhoof, K.3
Van Der Werf, J.4
-
14
-
-
70349373797
-
Petri net transformations for business processes - A survey
-
Trans. on Petri Nets and Other Models of Concurrency, Springer
-
N. Lohmann, E. Verbeek, and R. Dijkman. Petri net transformations for business processes - A survey. In Trans. on Petri Nets and Other Models of Concurrency, volume 5460 of LNCS, pages 46-63. Springer, 2009.
-
(2009)
LNCS
, vol.5460
, pp. 46-63
-
-
Lohmann, N.1
Verbeek, E.2
Dijkman, R.3
-
15
-
-
77955723244
-
Specification and Verification of Declarative Open Interaction Models
-
Springer
-
M. Montali. Specification and Verification of Declarative Open Interaction Models, volume 56 of LNBIP. Springer, 2010.
-
(2010)
LNBIP
, vol.56
-
-
Montali, M.1
-
16
-
-
33748543201
-
Distributed usage control
-
DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
-
A. Pretschner, M. Hilty, and D. Basin. Distributed usage control. Comm. of the ACM, 49(9):39-44, 2006. (Pubitemid 44371759)
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
17
-
-
35748949584
-
Conformance checking of processes based on monitoring real behavior
-
DOI 10.1016/j.is.2007.07.001, PII S030643790700049X
-
A. Rozinat and W. M. P. van der Aalst. Conformance checking of processes based on monitoring real behavior. Inf. Systems J., 33(1):64-95, 2008. (Pubitemid 350051578)
-
(2008)
Information Systems
, vol.33
, Issue.1
, pp. 64-95
-
-
Rozinat, A.1
Van Der Aalst, W.M.P.2
-
18
-
-
61849169018
-
Guidelines for conducting and reporting case study research in software engineering
-
P. Runeson and M. Höst. Guidelines for conducting and reporting case study research in software engineering. Empirical Soft. Eng., 14(2):131-164, 2009.
-
(2009)
Empirical Soft. Eng.
, vol.14
, Issue.2
, pp. 131-164
-
-
Runeson, P.1
Höst, M.2
-
19
-
-
0028513932
-
Access control: Principles and practice
-
R. Sandhu and P. Samarati. Access control: Principles and practice. IEEE Comm. Mag., 32(9):40-48, 1994.
-
(1994)
IEEE Comm. Mag.
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
20
-
-
79952504609
-
Using CAATs to support is audit
-
A. Sayana. Using CAATs to support is audit. Inf. Systems Control J., 1, 2003.
-
(2003)
Inf. Systems Control J.
, pp. 1
-
-
Sayana, A.1
-
22
-
-
77949692487
-
Auditing 2.0: Using process mining to support tomorrow's auditor
-
W. van der Aalst, K. van Hee, J. van der Werf, and M. Verdonk. Auditing 2.0: Using process mining to support tomorrow's auditor. IEEE Computer, 43(3):90-93, 2010.
-
(2010)
IEEE Computer
, vol.43
, Issue.3
, pp. 90-93
-
-
Van Der Aalst, W.1
Van Hee, K.2
Van Der Werf, J.3
Verdonk, M.4
-
23
-
-
4544353101
-
Workflow mining: Discovering process models from event logs
-
W. van der Aalst, T. Weijters, and L. Maruster. Workflow mining: Discovering process models from event logs. IEEE Trans. Knowl. Data Eng., 16(9):1128-1142, 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.9
, pp. 1128-1142
-
-
Van Der Aalst, W.1
Weijters, T.2
Maruster, L.3
-
24
-
-
33646698687
-
Process mining and verification of properties: An approach based on temporal logic
-
OTM Conferences, Springer
-
W. M. P. van der Aalst, H. T. de Beer, and B. F. van Dongen. Process mining and verification of properties: An approach based on temporal logic. In OTM Conferences, volume 3760 of LNCS, pages 130-147. Springer, 2005.
-
(2005)
LNCS
, vol.3760
, pp. 130-147
-
-
Van Der Aalst, W.M.P.1
De Beer, H.T.2
Van Dongen, B.F.3
-
25
-
-
26444580289
-
The ProM framework: A new era in process mining tool support
-
Applications and Theory of Petri Nets 2005: 26th International Conference, ICATPN 2005. Proceedings
-
B. van Dongen, A. de Medeiros, H. Verbeek, A. Weijters, and W. van der Aalst. The ProM framework: A new era in process mining tool support. In Conf. on Applications and Theory of Petri Nets, volume 3536 of LNCS, pages 444-454. Springer, 2005. (Pubitemid 41422025)
-
(2005)
Lecture Notes in Computer Science
, vol.3536
, pp. 444-454
-
-
Van Dongen, B.F.1
De Medeiros, A.K.A.2
Verbeek, H.M.W.3
Weijters, A.J.M.M.4
Van Der, A.W.M.P.5
|