T. E. Ramezani, V. Gromov, D. Fahland, and W. M. Van-der-aalst, Compliance Checking of Data-Aware and Resource-Aware Compliance Requirements, Move to Meaningful Internet Syst. OTM 2014 Conf. OTM 2014, vol.8841, pp.237-257, 2014.

D. Borrego and I. Barba, Conformance checking and diagnosis for declarative business process models in data-aware scenarios, Expert Syst. Appl, vol.41, issue.11, pp.5340-5352, 2014.

J. Ziemann and T. Matheis, Modelling of cross-organizational business processes-current methods and standards, Proc. EMISA '07, vol.2, pp.87-100, 2007.

P. R. Telang and M. P. Singh, Specifying and verifying cross-organizational business models: An agent-oriented approach, IEEE Trans. Serv. Comput, vol.5, issue.3, pp.305-318, 2012.

K. A. Schulz and M. E. Oklowska, Facilitating cross-organisational workflows with a workflow view approach, Data Knowl. Eng, vol.51, issue.1, pp.109-147, 2004.

J. Guynn, Facebook CEO Mark Zuckerberg finally speaks on Cambridge Analytica: We need to fix 'breach of trust, 2018.

C. Johnson, Enron ' s Ethical Collapse : Lessons for Leadership Educators, J. Leadersh. Educ, vol.2, issue.1, pp.45-56, 2003.

J. P. Kasse, L. Xu, and P. De-vrieze, A comparative assessment of collaborative business process verification approaches, vol.506, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01674878

J. P. Kasse and J. Nabukenya, Towards adoption of business process analysis and design techniques in transitional countries : design and validation, vol.2, pp.248-256, 2012.

S. Sadiq and G. Governatori, Managing Regulatory Compliance in Business Processes, Handb. Bus. Process Manag, vol.2, pp.159-175, 2008.

M. Kochanowski, C. Fehling, F. Koetter, F. Leymann, and A. Weisbecker, Compliance in BPM today -an insight into experts ' views and industry challenges, Inform. 2014. Big DataKomplexität meistern, pp.769-780, 2014.

S. Goedertier, J. Vanthienen, ;. Bpd, . Bpi, . Enei et al., Designing Compliant Business Processes with Obligations and Permissions, BPM, pp.5-14, 2006.

P. R. Sandhu, The RBAC96 Model, 2003.

R. K. Thomas and R. S. Sandhu, Task-based Authorization Controls ( TBAC ): A Family of Models for Active and Enterprise-oriented Authorization Management, Database Secur, vol.11, pp.166-181, 1997.

E. Yuan and J. Tong, Attributed Based Access Control (ABAC) for Web Services, The IEEE International Conference on Web Services, pp.561-569, 2005.

M. Gautam, Poster : Constrained Policy Mining in Attribute Based Access Control, pp.121-123, 2017.

M. Salnitri, F. Dalpiaz, and P. Giorgini, Modeling and verifying security policies in business processes, Lecture Notes in Business Information Processing, vol.175, pp.200-214, 2014.

M. Robol, M. Salnitri, and P. Giorgini, Toward GDPR-compliant socio-technical systems: Modeling language and reasoning framework, Lect. Notes Bus. Inf. Process, vol.305, pp.236-250, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01765249

J. Müller, Security Mechanisms for Workflows in Service-Oriented Architectures, 2015.

C. Combi, L. Viganò, and M. Zavatteri, Security Constraints in Temporal Role-Based, Codaspy, pp.207-218, 2016.

A. Elgammal, O. Turetken, W. J. Van-den-heuvel, and M. Papazoglou, Formalizing and appling compliance patterns for business process compliance, Softw. Syst. Model, vol.15, issue.1, pp.119-146, 2016.

S. Sadiq, G. Governatori, and K. Namiri, Modeling Control Objectives for Business Process Compliance, 5th Int. Conf. BPM 2007, pp.149-164, 2007.

S. Goedertier, Declarative Techniques for Modeling and Mining Business Processes, p.248, 2008.

V. Goedertier, Compliant and Flexible Business Processes with\nBusiness Rules, Bpmds, pp.94-103, 2007.

D. Schumm, F. Leymann, Z. Ma, T. Scheibler, and S. Strauch, Integrating Compliance into Business Processes Process Fragments as Reusable Compliance Controls, pp.2125-2137, 2010.

S. Fenech, G. J. Pace, and G. Schneider, Automatic conflict detection on contracts, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, vol.5684, pp.200-214, 2009.

S. Fenech, G. J. Pace, and G. Schneider, CLAN: A tool for contract analysis and conflict discovery, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol.5799, pp.90-96, 2009.

A. M. Ertugrul and O. Demirors, An exploratory study on role-based collaborative business process modeling approaches, Proceedings of the 7th International Conference on SubjectOriented Business Process Management -S-BPM ONE '15, pp.1-5, 2015.

A. R. Khan, Access control in cloud computing environment, ARPN J. Eng. Appl. Sci, vol.7, issue.5, pp.613-615, 2012.

R. Sandhu, Rationale for the RBAC96 family of access control models, Proc. first ACM Work. Role-based access Control -RBAC, vol.95, issue.1, p.9, 1996.

A. Alshehri and R. Sandhu, Access Control Models for Virtual Object Communication in CloudEnabled IoT, 2017 IEEE International Conference on Information Reuse and Integration (IRI, 2017.

M. Wu, Role and Task Based Authorization Management for Process-View, Proc. Second Int. Conf. Secur. Cryptogr, pp.85-90, 2007.

K. Tan, J. Crampton, and C. A. Gunter, The Consistency of Task-Based Authorization Constraints in Workflow Systems, Proc. 17th IEEE Comput. Secur. Found. Work, pp.155-169, 2004.

. Axiomatics, Attribute Based Access Control (ABAC), 2018.

E. Ramezani, D. Fahland, and W. M. Van-der-aalst, Diagnostic Information in Temporal Compliance Checking, ech. rep., BPM Cent. Rep, issue.2, 2012.

E. , Towards a comprehensive framework for business process compliance FRAMEWORK FOR BUSINESS PROCESS, 2014.

N. Hall, M. B. Dwyer, G. S. Avrunin, and J. C. Corbett, Property Speci cation Patterns for FiniteState Veri cation 1 INTRODUCTION 2 DESIGN AND OTHER PATTERNS, Proc. Second Work. Form. methods Softw. Pract, vol.2, pp.7-15, 1998.

A. Cimatti, E. Clarke, and E. Giunchiglia, Nusmv 2: An opensource tool for symbolic model checking, Comput. Aided Verif, vol.2404, pp.359-364, 2002.

A. Biere, A. Cimatti, E. Clarke, and Y. Zhu, Symbolic Model Checking without BDDs ?, Tools Algorithms Constr. Anal. Syst, issue.97, pp.193-207, 1999.