Compliance Checking of Data-Aware and Resource-Aware Compliance Requirements, Move to Meaningful Internet Syst. OTM 2014 Conf. OTM 2014, vol.8841, pp.237-257, 2014. ,
Conformance checking and diagnosis for declarative business process models in data-aware scenarios, Expert Syst. Appl, vol.41, issue.11, pp.5340-5352, 2014. ,
Modelling of cross-organizational business processes-current methods and standards, Proc. EMISA '07, vol.2, pp.87-100, 2007. ,
Specifying and verifying cross-organizational business models: An agent-oriented approach, IEEE Trans. Serv. Comput, vol.5, issue.3, pp.305-318, 2012. ,
Facilitating cross-organisational workflows with a workflow view approach, Data Knowl. Eng, vol.51, issue.1, pp.109-147, 2004. ,
Facebook CEO Mark Zuckerberg finally speaks on Cambridge Analytica: We need to fix 'breach of trust, 2018. ,
Enron ' s Ethical Collapse : Lessons for Leadership Educators, J. Leadersh. Educ, vol.2, issue.1, pp.45-56, 2003. ,
, A comparative assessment of collaborative business process verification approaches, vol.506, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01674878
Towards adoption of business process analysis and design techniques in transitional countries : design and validation, vol.2, pp.248-256, 2012. ,
Managing Regulatory Compliance in Business Processes, Handb. Bus. Process Manag, vol.2, pp.159-175, 2008. ,
Compliance in BPM today -an insight into experts ' views and industry challenges, Inform. 2014. Big DataKomplexität meistern, pp.769-780, 2014. ,
Designing Compliant Business Processes with Obligations and Permissions, BPM, pp.5-14, 2006. ,
The RBAC96 Model, 2003. ,
Task-based Authorization Controls ( TBAC ): A Family of Models for Active and Enterprise-oriented Authorization Management, Database Secur, vol.11, pp.166-181, 1997. ,
Attributed Based Access Control (ABAC) for Web Services, The IEEE International Conference on Web Services, pp.561-569, 2005. ,
Poster : Constrained Policy Mining in Attribute Based Access Control, pp.121-123, 2017. ,
Modeling and verifying security policies in business processes, Lecture Notes in Business Information Processing, vol.175, pp.200-214, 2014. ,
Toward GDPR-compliant socio-technical systems: Modeling language and reasoning framework, Lect. Notes Bus. Inf. Process, vol.305, pp.236-250, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01765249
Security Mechanisms for Workflows in Service-Oriented Architectures, 2015. ,
Security Constraints in Temporal Role-Based, Codaspy, pp.207-218, 2016. ,
Formalizing and appling compliance patterns for business process compliance, Softw. Syst. Model, vol.15, issue.1, pp.119-146, 2016. ,
Modeling Control Objectives for Business Process Compliance, 5th Int. Conf. BPM 2007, pp.149-164, 2007. ,
Declarative Techniques for Modeling and Mining Business Processes, p.248, 2008. ,
Compliant and Flexible Business Processes with\nBusiness Rules, Bpmds, pp.94-103, 2007. ,
Integrating Compliance into Business Processes Process Fragments as Reusable Compliance Controls, pp.2125-2137, 2010. ,
Automatic conflict detection on contracts, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, vol.5684, pp.200-214, 2009. ,
CLAN: A tool for contract analysis and conflict discovery, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol.5799, pp.90-96, 2009. ,
An exploratory study on role-based collaborative business process modeling approaches, Proceedings of the 7th International Conference on SubjectOriented Business Process Management -S-BPM ONE '15, pp.1-5, 2015. ,
Access control in cloud computing environment, ARPN J. Eng. Appl. Sci, vol.7, issue.5, pp.613-615, 2012. ,
Rationale for the RBAC96 family of access control models, Proc. first ACM Work. Role-based access Control -RBAC, vol.95, issue.1, p.9, 1996. ,
Access Control Models for Virtual Object Communication in CloudEnabled IoT, 2017 IEEE International Conference on Information Reuse and Integration (IRI, 2017. ,
Role and Task Based Authorization Management for Process-View, Proc. Second Int. Conf. Secur. Cryptogr, pp.85-90, 2007. ,
The Consistency of Task-Based Authorization Constraints in Workflow Systems, Proc. 17th IEEE Comput. Secur. Found. Work, pp.155-169, 2004. ,
Attribute Based Access Control (ABAC), 2018. ,
Diagnostic Information in Temporal Compliance Checking, ech. rep., BPM Cent. Rep, issue.2, 2012. ,
Towards a comprehensive framework for business process compliance FRAMEWORK FOR BUSINESS PROCESS, 2014. ,
Property Speci cation Patterns for FiniteState Veri cation 1 INTRODUCTION 2 DESIGN AND OTHER PATTERNS, Proc. Second Work. Form. methods Softw. Pract, vol.2, pp.7-15, 1998. ,
Nusmv 2: An opensource tool for symbolic model checking, Comput. Aided Verif, vol.2404, pp.359-364, 2002. ,
Symbolic Model Checking without BDDs ?, Tools Algorithms Constr. Anal. Syst, issue.97, pp.193-207, 1999. ,