Automated Certification for Compliant Cloud-based Business Processes, Business & Information Systems Engineering, vol.14, issue.6, pp.145-154, 2011. ,
DOI : 10.1007/s12599-011-0155-7
URL : http://elibrary.aisnet.org/Default.aspx?url=http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1132&context=bise
Cost-Based Fitness in Conformance Checking, 2011 Eleventh International Conference on Application of Concurrency to System Design, pp.57-66, 2011. ,
DOI : 10.1109/ACSD.2011.19
URL : http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=720411
Personalized Medicine and Privacy -Pairing Genetic Information, EHRs Raises Concerns, 2010. ,
An Event-B Approach to Data Sharing Agreements, In: Integrated Formal Methods, vol.12, issue.2, pp.28-42, 2010. ,
DOI : 10.1007/11961635_2
URL : https://hal.archives-ouvertes.fr/inria-00525098
Measuring Privacy Compliance Using Fitness Metrics, Business Process Management, pp.114-119, 2012. ,
DOI : 10.1007/978-3-642-32885-5_8
URL : http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=736500
A decade of model-driven security, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.1-10, 2011. ,
DOI : 10.1145/1998441.1998443
Model-Driven Development of Security-Aware GUIs for Data-Centric Applications, FOSAD VI, pp.101-124, 2011. ,
DOI : 10.1007/978-3-642-16145-2_19
Towards Modelling Obligations in Event-B, In: ABZ, pp.181-194, 2008. ,
DOI : 10.1007/978-3-540-87603-8_15
URL : http://eprints.port.ac.uk/5020/1/ABZ08%2Dv10.pdf
The Ponder Policy Specification Language, Policies for Distributed Systems and Networks. POLICY '01, pp.18-38, 2001. ,
DOI : 10.1007/3-540-44569-2_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.4489
Goal-Oriented Elaboration of Security Requirements, 2001. ,
Robust process discovery with artificial negative events, Journal of Machine Learning Research, vol.10, pp.1305-1340, 2009. ,
Requirements-based Access Control Analysis and Policy Specification (ReCAPS), Information and Software Technology, vol.51, issue.6, pp.993-1009, 2009. ,
DOI : 10.1016/j.infsof.2008.11.005
Patient-centric authorization framework for electronic healthcare services, Computers & Security, vol.30, issue.2-3, pp.116-127, 2011. ,
DOI : 10.1016/j.cose.2010.09.001
CoReL: Policy-Based and Model-Driven Regulatory Compliance Management, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference, pp.247-256, 2011. ,
DOI : 10.1109/EDOC.2011.23
Security and privacy requirements analysis within a social setting, Journal of Lightwave Technology, pp.151-161, 2003. ,
DOI : 10.1109/ICRE.2003.1232746
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.7282
A Formal Support for Collaborative Data Sharing, pp.547-561, 2012. ,
DOI : 10.1007/978-3-642-32498-7_42
Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology, Advances in Intelligent Information Systems. Studies in Computational Intelligence 265, pp.147-174, 2010. ,
DOI : 10.1007/978-3-642-05183-8_6
A Model-Driven Approach for the Specification and Analysis of Access Control Policies, Proceedings of Confederated International Conferences On the Move to Meaningful Internet Systems, pp.1087-1103, 2008. ,
DOI : 10.1007/978-3-540-88873-4_11
Controlled data sharing in E-health, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST), pp.17-23, 2011. ,
DOI : 10.1109/STAST.2011.6059251
CNL4DSA, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.616-620, 2010. ,
DOI : 10.1145/1774088.1774218
A Design Phase for Data Sharing Agreements, In: DPM/SETOP, pp.25-41, 2011. ,
DOI : 10.1007/978-3-642-28879-1_3
Prioritised execution of privacy policies, 2012. ,
Purpose Control: Did You Process the Data for the Intended Purpose?, Proc. Secure Data Management, 2011. ,
DOI : 10.1109/TKDE.2004.47
How to make a decision: The analytic hierarchy process, European Journal of Operational Research, vol.48, issue.1, pp.9-26, 1990. ,
DOI : 10.1016/0377-2217(90)90057-I
Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009. ,
DOI : 10.1109/TSE.2008.88
Process Mining and Verification of Properties: An Approach Based on Temporal Logic, OTM, pp.130-147, 2005. ,
DOI : 10.1007/11575771_11
Impact of ICT on Home Healthcare, Proceedings of International Conference on Human Choice and Computers. IFIP Advances in Information and Communication Technology, pp.111-122, 2012. ,
DOI : 10.1007/978-3-642-33332-3_11
Process compliance analysis based on behavioural profiles, Information Systems, vol.36, issue.7, pp.1009-1025, 2011. ,
DOI : 10.1016/j.is.2011.04.002
Harris-Equifax Consumer Privacy Survey, Report, Equifax Inc, 1991. ,
Modeling organizations for information systems requirements engineering, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering, pp.34-41, 1993. ,
DOI : 10.1109/ISRE.1993.324839