Privacy Compliance Requirements in Workflow Environments

[1]  Dimitra I. Kaklamani,et al.  Legislation-Aware Privacy Protection in Passive Network Monitoring , 2010 .

[2]  Hao Wang,et al.  Towards workflow verification , 2010, CASCON.

[3]  Jan Vanthienen,et al.  Designing Compliant Business Processes with Obligations and Permissions , 2006, Business Process Management Workshops.

[4]  Ramaraj Palanisamy,et al.  Security and Privacy Issues in E-Government , 2012 .

[5]  Peter F. Edemekong,et al.  Health Insurance Portability and Accountability Act , 2020 .

[6]  Elisa Bertino,et al.  Access Control and Authorization Constraints for WS-BPEL , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).

[7]  Mike P. Papazoglou,et al.  Service oriented architectures: approaches, technologies and research issues , 2007, The VLDB Journal.

[8]  Eric Puybaret,et al.  Universal Declaration of Human Rights , 2006 .

[9]  Colin J. Fidge,et al.  Privacy-Aware Workflow Management , 2013, Business Process Management.

[10]  Jason Maassen,et al.  Programming Scientific and Distributed Workflow with Triana Services , 2004 .

[11]  Mathias Weske,et al.  Visually specifying compliance rules and explaining their violations for business processes , 2011, J. Vis. Lang. Comput..

[12]  Wil M. P. van der Aalst,et al.  Workflow Data Patterns: Identification, Representation and Tool Support , 2005, ER.

[13]  Dimitra I. Kaklamani,et al.  Leveraging Access Control for Privacy Protection: A Survey , 2012 .

[14]  Wil M. P. van der Aalst,et al.  Workflow Patterns , 2004, Distributed and Parallel Databases.

[15]  Shazia Wasim Sadiq,et al.  Detecting Regulatory Compliance for Business Process Models through Semantic Annotations , 2008, Business Process Management Workshops.

[16]  Samuel Paul Kaluvuri,et al.  A Data-Centric Approach for Privacy-Aware Business Process Enablement , 2011, IWEI.

[17]  Yves Poullet,et al.  EU data protection policy. The Directive 95/46/EC: Ten years after , 2006, Comput. Law Secur. Rev..

[18]  Dimitra I. Kaklamani,et al.  An ontology-based approach towards comprehensive workflow modelling , 2014, IET Softw..

[19]  Michael D Birnhack,et al.  The EU Data Protection Directive: An engine of a global regime , 2008, Comput. Law Secur. Rev..

[20]  Mathias Weske,et al.  Scientific Workflows: Business as Usual? , 2009, BPM.

[21]  Wil M.P. van der Aalst,et al.  YAWL: yet another workflow language , 2005, Inf. Syst..

[22]  Nora Cuppens-Boulahia,et al.  A privacy-aware access control model for distributed network monitoring , 2013, Comput. Electr. Eng..

[23]  Nora Cuppens-Boulahia,et al.  Deploying Security Policy in Intra and Inter Workflow Management Systems , 2009, 2009 International Conference on Availability, Reliability and Security.

[24]  Jan H. P. Eloff,et al.  Separation of duties for access control enforcement in workflow environments , 2001, IBM Syst. J..

[25]  James F. Allen Towards a General Theory of Action and Time , 1984, Artif. Intell..

[26]  Andreas Schaad,et al.  Model-driven business process security requirement specification , 2009, J. Syst. Archit..

[27]  Andreas Schaad,et al.  Task-based entailment constraints for basic workflow patterns , 2008, SACMAT '08.

[28]  Serge Gutwirth,et al.  European Data Protection: Coming of Age , 2013, European Data Protection.

[29]  C. Petri Kommunikation mit Automaten , 1962 .

[30]  van der Wmp Wil Aalst,et al.  Workflow control-flow patterns : a revised view , 2006 .

[31]  Graham Greenleaf,et al.  Sheherezade and the 101 Data Privacy Laws: Origins, Significance and Global Trajectories , 2013 .

[32]  Wil M. P. van der Aalst,et al.  Workflow Resource Patterns: Identification, Representation and Tool Support , 2005, CAiSE.

[33]  Daniele Senzani CHARTER OF FUNDAMENTAL RIGHTS OF THE EUROPEAN UNION , 2016 .

[34]  Arthur H. M. ter Hofstede,et al.  newYAWL: Towards Workflow 2.0 , 2009, Trans. Petri Nets Other Model. Concurr..

[35]  Andreas Schaad,et al.  Modeling of Task-Based Authorization Constraints in BPMN , 2007, BPM.

[36]  Shazia Wasim Sadiq,et al.  Measurement of Compliance Distance in Business Processes , 2008, Inf. Syst. Manag..

[37]  Dear Mr Sotiropoulos ARTICLE 29 Data Protection Working Party , 2013 .

[38]  Nora Cuppens-Boulahia,et al.  Modeling contextual security policies , 2008, International Journal of Information Security.

[39]  Edward A. Lee,et al.  Scientific workflow management and the Kepler system , 2006, Concurr. Comput. Pract. Exp..

[40]  Andreas Speck,et al.  Integrated privacy modeling and validation for business process models , 2012, EDBT-ICDT '12.

[41]  Jin Tong,et al.  Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).

[42]  A. Cavoukian Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .