Business Process Security Analysis - Design Time, Run Time, Audit Time
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] John A. Zachman,et al. Business Process Trends , 2015, The Complete Business Process Handbook, Vol. I.
[3] Roberto Gorrieri,et al. Petri Net Security Checker: Structural Non-interference at Work , 2009, Formal Aspects in Security and Trust.
[4] Remco M. Dijkman,et al. Petri Net Transformations for Business Processes - A Survey , 2009, Trans. Petri Nets Other Model. Concurr..
[5] Lutz Lowis,et al. Vulnerability Analysis in SOA-Based Business Processes , 2011, IEEE Transactions on Services Computing.
[6] Rafael Accorsi,et al. On the exploitation of process mining for security audits: the conformance checking case , 2012, SAC '12.
[7] Rafael Accorsi,et al. InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements , 2010, STM.
[8] Rafael Accorsi,et al. SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[9] Josep Carmona,et al. New Region-Based Algorithms for Deriving Bounded Petri Nets , 2010, IEEE Transactions on Computers.
[10] M. Hammer. The process audit. , 2007, Harvard business review.
[11] Dirk Fahland,et al. Information Flow Security for Business Process Models - just one click away , 2012, BPM.
[12] Manfred Reichert,et al. From ADEPT to AristaFlow BPM Suite: A Research Vision Has Become Reality , 2009, Business Process Management Workshops.
[13] Günter Müller,et al. On the exploitation of process mining for security audits: the process discovery case , 2013, SAC '13.
[14] Roberto Gorrieri,et al. Structural non-interference in elementary and trace nets , 2009, Mathematical Structures in Computer Science.
[15] Günter Müller,et al. Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten , 2010, Informatik-Spektrum.
[16] M. Bouaziz,et al. An Introduction to Computer Security , 2012 .
[17] Rafael Accorsi,et al. Strong non-leak guarantees for workflow models , 2011, SAC.
[18] Rafael Accorsi,et al. Automatic Information Flow Analysis of Business Process Models , 2012, BPM.
[19] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.