ComCert: Automated certification of cloud-based business processes, ERCIM News, vol.83, pp.50-51, 2010. ,
DOI : 10.1007/s12599-011-0155-7
Auditing Workflow Executions against Dataflow Policies, Proceedings of the Thirteenth International Conference on Business Information Systems, pp.207-217, 2010. ,
DOI : 10.1007/978-3-642-12814-1_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.2344
InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements, Proceedings of the Sixth ERCIM Workshop on Security and Trust Management, 2010. ,
DOI : 10.1007/978-3-642-22444-7_13
A Chinese wall security model for decentralized workflow systems, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.48-57, 2001. ,
DOI : 10.1145/501983.501991
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.524.7141
Virtual machine for computer forensics ? The open source perspective, in Open Source Software for Digital Forensics, pp.25-42, 2010. ,
Finding the Leak: A Privacy Audit System for Sensitive XML Databases, 22nd International Conference on Data Engineering Workshops (ICDEW'06), pp.100-110, 2006. ,
DOI : 10.1109/ICDEW.2006.61
Structural non-interference in elementary and trace nets, Mathematical Structures in Computer Science, vol.1491, issue.06, pp.1065-1090, 2009. ,
DOI : 10.1007/3-540-65306-6_14
Inferring sources of leaks in document management systems, in Advances in Digital Forensics IV, I, pp.291-306, 2008. ,
Controlling data in the cloud, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.85-90, 2009. ,
DOI : 10.1145/1655008.1655020
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Petri net security checker: Structural non-interference at work, Proceedings of the Fifth International Workshop on Formal Aspects in Security and Trust, pp.210-225, 2008. ,
Forensic web services, in Advances in Digital Forensics IV, I, pp.163-176, 2008. ,
Live Analysis: Progress and Challenges, IEEE Security & Privacy Magazine, vol.7, issue.2, pp.30-37, 2009. ,
DOI : 10.1109/MSP.2009.43
A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
DOI : 10.1145/362375.362389
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.111.1196
Vulnerability Analysis in SOA-Based Business Processes, IEEE Transactions on Service Computing, 2011. ,
DOI : 10.1109/TSC.2010.37
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.417.1505
Forensic analysis of database tampering, ACM Transactions on Database Systems, vol.33, issue.4, pp.1-3047, 2008. ,
DOI : 10.1145/1412331.1412342
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.4734
Highly efficient techniques for network forensics, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.150-160, 2007. ,
DOI : 10.1145/1315245.1315265
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.210.3058
Authentication, access control, and audit, ACM Computing Surveys, vol.28, issue.1, pp.241-243, 1996. ,
DOI : 10.1145/234313.234412
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5643
Threats to privacy in the forensic analysis of database systems, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.91-102, 2007. ,
DOI : 10.1145/1247480.1247492
Formulating the Data-Flow Perspective for Business Process Management, Information Systems Research, vol.17, issue.4, pp.374-391, 2006. ,
DOI : 10.1287/isre.1060.0105
Data-flow antipatterns: Discovering data-flow errors in workflows, Proceedings of the Twenty-First International Conference on Advanced Information Systems Engineering, pp.425-439, 2009. ,
Workflow mining: A survey of issues and approaches, Data & Knowledge Engineering, vol.47, issue.2, pp.237-267, 2003. ,
DOI : 10.1016/S0169-023X(03)00066-1
Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor, Computer, vol.43, issue.3, pp.90-93, 2010. ,
DOI : 10.1109/MC.2010.61