Works matching IS 16112776 AND DT 2013 AND VI 55 AND IP 6
Results: 8
Business Process Security Analysis - Design Time, Run Time, Audit Time.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 217, doi. 10.1524/itit.2013.2001
- By:
- Publication type:
- Article
Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 225, doi. 10.1524/itit.2013.2002
- By:
- Publication type:
- Article
Business Process Compliance: An Abstract Normative Framework.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 231, doi. 10.1524/itit.2013.2003
- By:
- Publication type:
- Article
Integrating Security Aspects into Business Process Models.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 239, doi. 10.1524/itit.2013.2004
- By:
- Publication type:
- Article
Privacy Analysis of User Behavior Using Alignments.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 255, doi. 10.1524/itit.2013.2006
- By:
- Publication type:
- Article
Security in Business Process Management.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 215, doi. 10.1524/itit.2013.9006
- By:
- Publication type:
- Article
Masthead.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 213, doi. 10.1524/itit-2013-masthead6
- Publication type:
- Article
Security and Privacy in Business Processes: A Posteriori Analysis Techniques.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 247, doi. 10.1524/itit.2013.2005
- By:
- Publication type:
- Article