InDico: Information flow analysis of business processes for confidentiality requirements " in 6th International Workshop, Security and Trust Management in Athens, pp.194-209, 2010. ,
Strong non-leak guarantees for workflow models, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.308-314, 2011. ,
DOI : 10.1145/1982185.1982254
Automatic Information Flow Analysis of Business Process Models, Business Process Management in Tallin, pp.172-187, 2012. ,
DOI : 10.1007/978-3-642-32885-5_13
Volume I: Guide for mapping types of information and information systems to security categories " in NIST Special Publication 800-60 Volume I Revision 1, NIST, pp.20899-8930, 2008. ,
DOI : 10.6028/NIST.SP.800-60ver2v1
Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories " in NIST Special Publication 800-60, pp.20899-8930, 2008. ,
DOI : 10.6028/NIST.SP.800-60ver2v2
Business Process-Based Resource Importance Determination, Business Process Management Conference in, pp.113-127, 2009. ,
DOI : 10.1016/S0306-4379(00)00003-X
ISO/IEC 27001:2013, Information technology -Security techniques - Information security risk management, 2013. ,
Information flow security for business process models just one click away, Proceedings of the Demo Track of the 10th International Conference on Business Process Management 2012 in, p.2012, 2012. ,
Modeling wizard for confidential business processes " in Business Process Management Workshops in Tallin, pp.675-688, 2012. ,
Petri net transformations for business processes?a survey Transactions on Petri nets and other models of concurrency II, pp.46-63, 2009. ,
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) " in NIST Special Publication 800-122, pp.20899-8930, 2010. ,