R. Accorsi and C. Wonnemann, InDico: Information flow analysis of business processes for confidentiality requirements " in 6th International Workshop, Security and Trust Management in Athens, pp.194-209, 2010.

R. Accorsi and C. Wonnemann, Strong non-leak guarantees for workflow models, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.308-314, 2011.
DOI : 10.1145/1982185.1982254

R. Accorsi and A. Lehmann, Automatic Information Flow Analysis of Business Process Models, Business Process Management in Tallin, pp.172-187, 2012.
DOI : 10.1007/978-3-642-32885-5_13

W. Barker, K. Stine, R. Kissel, J. Fahlsing, and J. Gulick, Volume I: Guide for mapping types of information and information systems to security categories " in NIST Special Publication 800-60 Volume I Revision 1, NIST, pp.20899-8930, 2008.
DOI : 10.6028/NIST.SP.800-60ver2v1

W. Barker, K. Stine, R. Kissel, J. Fahlsing, and A. Lee, Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories " in NIST Special Publication 800-60, pp.20899-8930, 2008.
DOI : 10.6028/NIST.SP.800-60ver2v2

S. Fenz, A. Ekelhart, and T. Neubauer, Business Process-Based Resource Importance Determination, Business Process Management Conference in, pp.113-127, 2009.
DOI : 10.1016/S0306-4379(00)00003-X

I. Iec, ISO/IEC 27001:2013, Information technology -Security techniques - Information security risk management, 2013.

A. Lehmann and D. Fahland, Information flow security for business process models just one click away, Proceedings of the Demo Track of the 10th International Conference on Business Process Management 2012 in, p.2012, 2012.

A. Lehmann and N. Lohmann, Modeling wizard for confidential business processes " in Business Process Management Workshops in Tallin, pp.675-688, 2012.

N. Lohmann, E. Verbeek, and R. Dijkman, Petri net transformations for business processes?a survey Transactions on Petri nets and other models of concurrency II, pp.46-63, 2009.

E. Mccallister, T. Grance, and K. Scarfone, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) " in NIST Special Publication 800-122, pp.20899-8930, 2010.