-
1
-
-
44649131263
-
Automated privacy audits to complement the notion of control for identity management
-
de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.), Springer, Heidelberg
-
Accorsi, R.: Automated Privacy Audits to Complement the Notion of Control for Identity Management. In: de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.) Policies and Research in Identity Management, IFIP, vol. 261. Springer, Heidelberg (2008)
-
(2008)
Policies and Research in Identity Management, IFIP
, vol.261
-
-
Accorsi, R.1
-
2
-
-
71249116454
-
Safe-keeping digital evidence with secure logging protocols: State of the art and challenges
-
September 2009
-
Accorsi, R.: Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. In: Proceedings IMF 2009, September 2009, pp. 94-110 (2009)
-
(2009)
Proceedings IMF 2009
, pp. 94-110
-
-
Accorsi, R.1
-
3
-
-
84883001875
-
Detective information flow analysis for business processes
-
Accorsi, R., Wonnemann, C.: Detective information flow analysis for business processes. In: BPSC, pp. 223-224 (2009)
-
(2009)
BPSC
, pp. 223-224
-
-
Accorsi, R.1
Wonnemann, C.2
-
4
-
-
84855994877
-
Understanding the costs of compliance
-
July
-
Bace, J., Rozwell, C., Feiman, J., Kirwin, B.: Understanding the costs of compliance. Technical report, Gartner Research (July 2006)
-
(2006)
Technical Report, Gartner Research
-
-
Bace, J.1
Rozwell, C.2
Feiman, J.3
Kirwin, B.4
-
5
-
-
70849107955
-
Verifying the interplay of authorization policies and workflow in service-oriented architectures
-
Barletta, M., Ranise, S., Viganò, L.: Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. In: CSE (3), pp. 289-296 (2009)
-
(2009)
CSE
, vol.3
, pp. 289-296
-
-
Barletta, M.1
Ranise, S.2
Viganò, L.3
-
7
-
-
80054077620
-
Wirtschaftskriminalität - sicherheitslage in deutschen großunternehmen
-
in German
-
Bussmann, K.-D., Krieg, O., Nestler, C., Salvenmoser, S., Schroth, A., Theile, A., Trunk, D.: Wirtschaftskriminalität, - Sicherheitslage in deutschen Großunternehmen. Report by Martin-Luther-Universität Halle-Wittenberg and PricewaterhouseCoopers AG (2009) (in German)
-
(2009)
Report by Martin-Luther-Universität Halle-Wittenberg and PricewaterhouseCoopers AG
-
-
Bussmann, K.-D.1
Krieg, O.2
Nestler, C.3
Salvenmoser, S.4
Schroth, A.5
Theile, A.6
Trunk, D.7
-
8
-
-
33745005053
-
An audit logic for accountability
-
DOI 10.1109/POLICY.2005.5, 1454301, Proceedings - Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005
-
Cederquist, J.G., Corin, R., Dekker, M.A.C., Etalle, S., den Hartog, J.I.: An Audit Logic for Accountability. In: Proceedings of the Sixth IEEE InternationalWorkshop on Policies for Distributed Systems and Networks, pp. 34-43. IEEE Computer Society, Los Alamitos (2005) (Pubitemid 43861246)
-
(2005)
Proceedings - Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005
, vol.2005
, pp. 34-43
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
Den Hartog, J.I.5
-
10
-
-
34250656241
-
Dynamic path conditions in dependence graphs
-
DOI 10.1145/1111542.1111552, PEPM 2006: Proceedings of the Workshop on Partial Evaluation and Program Manipulation
-
Hammer, C., Grimme, M., Krinke, J.: Dynamic path conditions in dependence graphs. In: Proceedings PEPM 2006, pp. 58-67. ACM, New York (2006) (Pubitemid 46946397)
-
(2006)
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation
, pp. 58-67
-
-
Hammer, C.1
Grimme, M.2
Krinke, J.3
-
12
-
-
78650760999
-
Automating privacy compliance with EXPDT
-
Kähmer, M., Gilliot, M., Müller, G.: Automating Privacy Compliance with ExPDT. In: CEC/EEE, pp. 87-94 (2008)
-
(2008)
CEC/EEE
, pp. 87-94
-
-
Kähmer, M.1
Gilliot, M.2
Müller, G.3
-
13
-
-
0015672289
-
A note on the confinement problem
-
Lampson, B.W.: A note on the confinement problem. Communications of the ACM 16(10), 613-615 (1973)
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
14
-
-
84911352318
-
-
Livshits, B., Nori, A.V., Rajamani, S.K., Banerjee, A.: Merlin: Specification inference for explicit information flow problems
-
Merlin: Specification Inference for Explicit Information Flow Problems
-
-
Livshits, B.1
Nori, A.V.2
Rajamani, S.K.3
Banerjee, A.4
-
15
-
-
33749986269
-
Analyzing interacting BPEL processes
-
Business Process Management - 4th International Conference, BPM 2006, Proceedings
-
Lohmann, N., Massuthe, P., Stahl, C., Weinberg, D.: Analyzing Interacting BPEL Processes. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 17-32. Springer, Heidelberg (2006) (Pubitemid 44568316)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4102
, pp. 17-32
-
-
Lohmann, N.1
Massuthe, P.2
Stahl, C.3
Weinberg, D.4
-
16
-
-
77951442815
-
Secure usage control for transparency in financial markets
-
Müller, G., Accorsi, R., Höhn, S., Sackmann, S.: Secure usage control for transparency in financial markets. Informatik Spektrum 33(1), 3-13 (2010)
-
(2010)
Informatik Spektrum
, vol.33
, Issue.1
, pp. 3-13
-
-
Müller, G.1
Accorsi, R.2
Höhn, S.3
Sackmann, S.4
-
18
-
-
33847060397
-
Formulating the data- flow perspective for business process management
-
Sun, S.X., Zhao, J.L., Nunamaker, J.F., Sheng, O.R.L.: Formulating the Data- Flow Perspective for Business Process Management. Information Systems Research 17(4), 374-391 (2006)
-
(2006)
Information Systems Research
, vol.17
, Issue.4
, pp. 374-391
-
-
Sun, S.X.1
Zhao, J.L.2
Nunamaker, J.F.3
Sheng, O.R.L.4
-
19
-
-
4544353101
-
Workflow mining: Discovering process models from event logs
-
van der Aalst, W., Weijters, T., Maruster, L.: Workflow Mining: Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering 16(9), 1128-1142 (2004)
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1128-1142
-
-
Van Der Aalst, W.1
Weijters, T.2
Maruster, L.3
-
21
-
-
70449659976
-
On information flow forensics in business application scenarios
-
IEEE Computer Society, Los Alamitos
-
Wonnemann, C., Accorsi, R., Müller, G.: On Information Flow Forensics in Business Application Scenarios. In: Proceedings Compsac 2009, vol. 2, pp. 324-328. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
Proceedings Compsac 2009
, vol.2
, pp. 324-328
-
-
Wonnemann, C.1
Accorsi, R.2
Müller, G.3
|