Privacy Compliance Requirements in Workflow Environments
暂无分享,去创建一个
Dimitra I. Kaklamani | Iakovos S. Venieris | Eugenia I. Papagiannakopoulou | Maria N. Koukovini | Georgios V. Lioudakis | Nikolaos L. Dellas
[1] Dimitra I. Kaklamani,et al. Legislation-Aware Privacy Protection in Passive Network Monitoring , 2010 .
[2] Hao Wang,et al. Towards workflow verification , 2010, CASCON.
[3] Jan Vanthienen,et al. Designing Compliant Business Processes with Obligations and Permissions , 2006, Business Process Management Workshops.
[4] Ramaraj Palanisamy,et al. Security and Privacy Issues in E-Government , 2012 .
[5] Peter F. Edemekong,et al. Health Insurance Portability and Accountability Act , 2020 .
[6] Elisa Bertino,et al. Access Control and Authorization Constraints for WS-BPEL , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).
[7] Mike P. Papazoglou,et al. Service oriented architectures: approaches, technologies and research issues , 2007, The VLDB Journal.
[8] Eric Puybaret,et al. Universal Declaration of Human Rights , 2006 .
[9] Colin J. Fidge,et al. Privacy-Aware Workflow Management , 2013, Business Process Management.
[10] Jason Maassen,et al. Programming Scientific and Distributed Workflow with Triana Services , 2004 .
[11] Mathias Weske,et al. Visually specifying compliance rules and explaining their violations for business processes , 2011, J. Vis. Lang. Comput..
[12] Wil M. P. van der Aalst,et al. Workflow Data Patterns: Identification, Representation and Tool Support , 2005, ER.
[13] Dimitra I. Kaklamani,et al. Leveraging Access Control for Privacy Protection: A Survey , 2012 .
[14] Wil M. P. van der Aalst,et al. Workflow Patterns , 2004, Distributed and Parallel Databases.
[15] Shazia Wasim Sadiq,et al. Detecting Regulatory Compliance for Business Process Models through Semantic Annotations , 2008, Business Process Management Workshops.
[16] Samuel Paul Kaluvuri,et al. A Data-Centric Approach for Privacy-Aware Business Process Enablement , 2011, IWEI.
[17] Yves Poullet,et al. EU data protection policy. The Directive 95/46/EC: Ten years after , 2006, Comput. Law Secur. Rev..
[18] Dimitra I. Kaklamani,et al. An ontology-based approach towards comprehensive workflow modelling , 2014, IET Softw..
[19] Michael D Birnhack,et al. The EU Data Protection Directive: An engine of a global regime , 2008, Comput. Law Secur. Rev..
[20] Mathias Weske,et al. Scientific Workflows: Business as Usual? , 2009, BPM.
[21] Wil M.P. van der Aalst,et al. YAWL: yet another workflow language , 2005, Inf. Syst..
[22] Nora Cuppens-Boulahia,et al. A privacy-aware access control model for distributed network monitoring , 2013, Comput. Electr. Eng..
[23] Nora Cuppens-Boulahia,et al. Deploying Security Policy in Intra and Inter Workflow Management Systems , 2009, 2009 International Conference on Availability, Reliability and Security.
[24] Jan H. P. Eloff,et al. Separation of duties for access control enforcement in workflow environments , 2001, IBM Syst. J..
[25] James F. Allen. Towards a General Theory of Action and Time , 1984, Artif. Intell..
[26] Andreas Schaad,et al. Model-driven business process security requirement specification , 2009, J. Syst. Archit..
[27] Andreas Schaad,et al. Task-based entailment constraints for basic workflow patterns , 2008, SACMAT '08.
[28] Serge Gutwirth,et al. European Data Protection: Coming of Age , 2013, European Data Protection.
[29] C. Petri. Kommunikation mit Automaten , 1962 .
[30] van der Wmp Wil Aalst,et al. Workflow control-flow patterns : a revised view , 2006 .
[31] Graham Greenleaf,et al. Sheherezade and the 101 Data Privacy Laws: Origins, Significance and Global Trajectories , 2013 .
[32] Wil M. P. van der Aalst,et al. Workflow Resource Patterns: Identification, Representation and Tool Support , 2005, CAiSE.
[33] Daniele Senzani. CHARTER OF FUNDAMENTAL RIGHTS OF THE EUROPEAN UNION , 2016 .
[34] Arthur H. M. ter Hofstede,et al. newYAWL: Towards Workflow 2.0 , 2009, Trans. Petri Nets Other Model. Concurr..
[35] Andreas Schaad,et al. Modeling of Task-Based Authorization Constraints in BPMN , 2007, BPM.
[36] Shazia Wasim Sadiq,et al. Measurement of Compliance Distance in Business Processes , 2008, Inf. Syst. Manag..
[37] Dear Mr Sotiropoulos. ARTICLE 29 Data Protection Working Party , 2013 .
[38] Nora Cuppens-Boulahia,et al. Modeling contextual security policies , 2008, International Journal of Information Security.
[39] Edward A. Lee,et al. Scientific workflow management and the Kepler system , 2006, Concurr. Comput. Pract. Exp..
[40] Andreas Speck,et al. Integrated privacy modeling and validation for business process models , 2012, EDBT-ICDT '12.
[41] Jin Tong,et al. Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).
[42] A. Cavoukian. Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .