R. Accorsi and L. Lowis, ComCert: Automated certification of cloud-based business processes, ERCIM News, vol.83, pp.50-51, 2010.
DOI : 10.1007/s12599-011-0155-7

R. Accorsi and C. Wonnemann, Auditing Workflow Executions against Dataflow Policies, Proceedings of the Thirteenth International Conference on Business Information Systems, pp.207-217, 2010.
DOI : 10.1007/978-3-642-12814-1_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Accorsi and C. Wonnemann, InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements, Proceedings of the Sixth ERCIM Workshop on Security and Trust Management, 2010.
DOI : 10.1007/978-3-642-22444-7_13

V. Atluri, S. Chun, and P. Mazzoleni, A Chinese wall security model for decentralized workflow systems, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.48-57, 2001.
DOI : 10.1145/501983.501991

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Bem, Virtual machine for computer forensics ? The open source perspective, in Open Source Software for Digital Forensics, pp.25-42, 2010.

S. Bottcher and R. Steinmetz, Finding the Leak: A Privacy Audit System for Sensitive XML Databases, 22nd International Conference on Data Engineering Workshops (ICDEW'06), pp.100-110, 2006.
DOI : 10.1109/ICDEW.2006.61

N. Busi and R. Gorrieri, Structural non-interference in elementary and trace nets, Mathematical Structures in Computer Science, vol.1491, issue.06, pp.1065-1090, 2009.
DOI : 10.1007/3-540-65306-6_14

M. Chandrasekaran, V. Sankaranarayanan, and S. Upadhyaya, Inferring sources of leaks in document management systems, in Advances in Digital Forensics IV, I, pp.291-306, 2008.

R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon et al., Controlling data in the cloud, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.85-90, 2009.
DOI : 10.1145/1655008.1655020

D. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

S. Frau, R. Gorrieri, and C. Ferigato, Petri net security checker: Structural non-interference at work, Proceedings of the Fifth International Workshop on Formal Aspects in Security and Trust, pp.210-225, 2008.

M. Gunestas, D. Wijesekera, and A. Singhal, Forensic web services, in Advances in Digital Forensics IV, I, pp.163-176, 2008.

B. Hay, M. Bishop, and K. Nance, Live Analysis: Progress and Challenges, IEEE Security & Privacy Magazine, vol.7, issue.2, pp.30-37, 2009.
DOI : 10.1109/MSP.2009.43

B. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

L. Lowis and R. Accorsi, Vulnerability Analysis in SOA-Based Business Processes, IEEE Transactions on Service Computing, 2011.
DOI : 10.1109/TSC.2010.37

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

K. Pavlou and R. Snodgrass, Forensic analysis of database tampering, ACM Transactions on Database Systems, vol.33, issue.4, pp.1-3047, 2008.
DOI : 10.1145/1412331.1412342

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Ponec, P. Giura, H. Bronnimann, and J. Wein, Highly efficient techniques for network forensics, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.150-160, 2007.
DOI : 10.1145/1315245.1315265

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Sandhu and P. Samarati, Authentication, access control, and audit, ACM Computing Surveys, vol.28, issue.1, pp.241-243, 1996.
DOI : 10.1145/234313.234412

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Stahlberg, G. Miklau, and B. Levine, Threats to privacy in the forensic analysis of database systems, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.91-102, 2007.
DOI : 10.1145/1247480.1247492

S. Sun, J. Zhao, J. Nunamaker, and O. Sheng, Formulating the Data-Flow Perspective for Business Process Management, Information Systems Research, vol.17, issue.4, pp.374-391, 2006.
DOI : 10.1287/isre.1060.0105

N. Trcka, W. Van-der-aalst, and N. Sidorova, Data-flow antipatterns: Discovering data-flow errors in workflows, Proceedings of the Twenty-First International Conference on Advanced Information Systems Engineering, pp.425-439, 2009.

W. Van-der-aalst, B. Van-dongen, J. Herbst, L. Maruster, G. Schimm et al., Workflow mining: A survey of issues and approaches, Data & Knowledge Engineering, vol.47, issue.2, pp.237-267, 2003.
DOI : 10.1016/S0169-023X(03)00066-1

W. Van-der-aalst, K. Van-hee, J. Van-der-werf, and M. Verdonk, Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor, Computer, vol.43, issue.3, pp.90-93, 2010.
DOI : 10.1109/MC.2010.61