Author of the publication

A Transformation Approach for Security Enhanced Business Processes

, , and . Proc. SE2008 of 26th IASTED International Multi-Conference, (February 2008)to appear.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles., and . SAC, page 1380-1384. ACM, (2004)Security and safety of assets in business processes., , and . SAC, page 1667-1673. ACM, (2012)A Framework for Evidence Lifecycle Management.. WISE Workshops, volume 4832 of Lecture Notes in Computer Science, page 191-200. Springer, (2007)Ontology-Based Secure XML Content Distribution., , , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 294-306. Springer, (2009)A lightweight approach to specification and analysis of role-based access control extensions., and . SACMAT, page 13-22. ACM, (2002)A Secure Comparison Technique for Tree Structured Data., , and . ICIW, page 304-309. IEEE Computer Society, (2009)Öpen Weakness and Vulnerability Modeler" (OVVL): An Updated Approach to Threat Modeling., and . ICETE (2), page 417-424. SciTePress, (2019)Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data., , , , , , , and . Sicherheit, volume P-228 of LNI, page 115-125. GI, (2014)Project OVVL - Threat Modeling Support for the entire secure development lifecycle.. Sicherheit, volume P-301 of LNI, page 121-124. Gesellschaft für Informatik e.V., (2020)XacT: a bridge between resource management and access control in multi-layered applications., , and . ACM SIGSOFT Softw. Eng. Notes, 30 (4): 1-7 (2005)