Author of the publication

A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models.

, , , , and . Business Process Management Workshops, volume 132 of Lecture Notes in Business Information Processing, page 719-724. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic support for RBAC break-glass policies in process-aware information systems., and . SAC, page 1441-1446. ACM, (2013)Evaluating A Uml-Based Modeling Framework For Process-Related Security Properties: A Qualitative Multi-Method Study., , and . ECIS, page 134. (2013)Modeling Support for Role-Based Delegation in Process-Aware Information Systems., and . Business & Information Systems Engineering, 6 (4): 215-237 (2014)Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments., and . MUSIC, page 126-131. IEEE, (2012)An Experimental Study on the Design and Modeling of Security Concepts in Business Processes., , , and . PoEM, volume 165 of Lecture Notes in Business Information Processing, page 236-250. Springer, (2013)Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems., and . Inf. Softw. Technol., 56 (10): 1289-1308 (2014)A Structured Process for Supervising Students' Final Theses and Projects in Computer Science., and . Int. J. Adv. Corp. Learn., (2022)Mobile Simulation Game for Learning Theory of Constraints Fundamentals., and . IMCL, volume 411 of Lecture Notes in Networks and Systems, page 51-59. Springer, (2021)Learning Diaries - A Valuable Companion of Mobile Learning for Higher Education in Software Engineering., and . IMCL, volume 1192 of Advances in Intelligent Systems and Computing, page 930-937. Springer, (2019)Multi-Access Edge Computing: An Overview and Latency Evaluation., , , and . ICIT, page 744-748. IEEE, (2021)