Information leak detection in business process models
暂无分享,去创建一个
Despite the correct deployment of access control mechanisms, information leaks can persist and threaten the reliability of business process execution. This paper presents an automated and effective...