Author of the publication

Privacy-Aware Workflow Management.

, , , and . Business Process Management, volume 444 of Studies in Computational Intelligence, Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Metrics for Java Bytecode Programs (S)., , and . SEKE, page 394-399. Knowledge Systems Institute Graduate School, (2013)Integrating Real-Time Scheduling Theory and Program Refinement., , , and . FME, volume 1051 of Lecture Notes in Computer Science, page 327-346. Springer, (1996)A genetic algorithm for the multi-source and multi-sink minimum vertex cut problem and its applications., and . IEEE Congress on Evolutionary Computation, page 3226-3233. IEEE, (2009)Preface.. CATS, volume 42 of Electronic Notes in Theoretical Computer Science, page 282-283. Elsevier, (2001)Partial Orders for Parallel Debugging.. Workshop on Parallel and Distributed Debugging, page 183-194. ACM, (1988)A Resilient Fog-IoT Framework for Seamless Microservice Execution., , , , and . SCC, page 213-221. IEEE, (2021)Formally Analysing a Security Protocol for Replay Attacks., and . ASWEC, page 171-180. IEEE Computer Society, (2006)Animation of Data Refinements., and . APSEC, page 137-146. IEEE Computer Society, (2002)Security Metrics for Object-Oriented Class Designs., , and . QSIC, page 11-20. IEEE Computer Society, (2009)Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling., , , and . ACSW, page 35:1-35:10. ACM, (2019)