Are we done with business process compliance: state of the art and challenges ahead, Knowl. Inf. Syst, vol.57, issue.1, pp.79-133, 2018. ,
Constraint-based workflow management systems: shifting control to users, 2008. ,
DECLARE: Full support for loosely-structured processes, Proc. -IEEE Int, pp.287-298, 2007. ,
Efficient Compliance Checking Using BPMN-Q and Temporal Logic, 2008. ,
Process Mining and Verification of Properties: An Approach Based on Temporal Logic, pp.130-147, 2005. ,
Framework for Business Process Verification, pp.50-61, 2011. ,
Business process verification -finally a reality!, Bus. Process Manag. J, vol.15, issue.1, pp.74-92, 2009. ,
Understanding Non-compliance, 2017. ,
Formalizing and appling compliance patterns for business process compliance, Softw. Syst. Model, vol.15, issue.1, pp.119-146, 2016. ,
Specification and automated design-time analysis of the business process human resource perspective, Inf. Syst, vol.52, pp.55-82, 2015. ,
Defining and analysing resource-aware process performance indicators, CEUR Workshop Proc, vol.998, pp.57-64, 2013. ,
Mining association rules to support resource allocation in business process management, vol.38, pp.9483-9490, 2011. ,
Resource-aware business process management: analysis and support, 2013. ,
On Enabling Data-Aware Compliance Checking of Business, 2010. ,
Conformance checking and diagnosis for declarative business process models in data-aware scenarios, Expert Syst. Appl, vol.41, issue.11, pp.5340-5352, 2014. ,
Modeling and verifying security policies in business processes, Lecture Notes in Business Information Processing, vol.175, pp.200-214, 2014. ,
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol.9636, pp.567-572, 2016. ,
Aligning Security and Business Objectives for Process-Aware Information Systems, Proc. 5th ACM Conf. Data Appl. Secur. Priv. -CODASPY '15, pp.243-243, 2015. ,
Security Constraints in Temporal Role-Based, Codaspy, pp.207-218, 2016. ,
Security for workflow systems, Inf. Secur. Tech. Rep, vol.6, issue.2, pp.59-68, 2001. ,
Privacy policy enforcement in enterprises with identity management solutions, J. Comput. Secur, vol.16, issue.2, pp.133-163, 2008. ,
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises information lifecycle management A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises, Policy, pp.118-134, 2006. ,
Access control in cloud computing environment, ARPN J. Eng. Appl. Sci, vol.7, issue.5, pp.613-615, 2012. ,
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT, 2017 IEEE International Conference on Information Reuse and Integration (IRI), 2017. ,
Inter-instance authorization constraints for secure workflow management, p.190, 2006. ,
Optimal Workflow-Aware Authorizations, Proc. 17th ACM Symp, pp.93-102, 2012. ,
The Consistency of Task-Based Authorization Constraints in Workflow Systems, Proc. 17th IEEE Comput. Secur. Found. Work, pp.155-169, 2004. ,
Context-based variant generation of business process models, Lecture Notes in Business Information Processing, vol.175, 2014. ,
On Managing Business Processes Variants ?, 2009. ,
Business Process Variability A:A Study into Process Management and Verification, 2016. ,
A Survey of Formal Business Process Verification: From Soundness to Variability, Proc. Third Int. Symp. Bus. Model. Softw. Des, pp.198-203, 2013. ,
Process Driven Access Control and Authorisation Approach, 2019. ,
The Need for Compliance Verification in Collaborative Business Processes, Work. Conf. Virtual Enterp, pp.217-229, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02191197
A comparative survey of Business Process Verification Methods and Tools, Work. Conf. Virtual Enterp, pp.355-367, 2017. ,
Basic Description Logics, Theory Implementations Appl. Cambridge, 2003. ,
Specification and automated design-time analysis of the business process human resource perspective, Inf. Syst, vol.52, pp.55-82, 2015. ,
Specification of communicating processes: Temporal logic versus refusalsbased refinement, Form. Asp. Comput, vol.20, issue.3, pp.277-294, 2008. ,
Workflow data patterns, Business, vol.66, pp.2004-2005, 2004. ,