M. Hashmi, G. Governatori, H. P. Lam, and M. T. Wynn, Are we done with business process compliance: state of the art and challenges ahead, Knowl. Inf. Syst, vol.57, issue.1, pp.79-133, 2018.

M. Pesic, Constraint-based workflow management systems: shifting control to users, 2008.

M. Pesic, H. Schonenberg, W. M. Van-der, and . Aalst, DECLARE: Full support for loosely-structured processes, Proc. -IEEE Int, pp.287-298, 2007.

A. Awad, G. Decker, and M. Weske, Efficient Compliance Checking Using BPMN-Q and Temporal Logic, 2008.

W. M. Van-der-aalst, H. T. De-beer, and B. F. Van-dongen, Process Mining and Verification of Properties: An Approach Based on Temporal Logic, pp.130-147, 2005.

A. Speck, S. Feja, A. Lotyzc, and C. Kiel, Framework for Business Process Verification, pp.50-61, 2011.

M. T. Wynn, H. M. Verbeek, W. M. Van-der-aalst, A. H. Ter-hofstede, and D. Edmond, Business process verification -finally a reality!, Bus. Process Manag. J, vol.15, issue.1, pp.74-92, 2009.

E. R. Taghiabadi, Understanding Non-compliance, 2017.

A. Elgammal, O. Turetken, W. J. Van-den-heuvel, and M. Papazoglou, Formalizing and appling compliance patterns for business process compliance, Softw. Syst. Model, vol.15, issue.1, pp.119-146, 2016.

C. Cabanillas, M. Resinas, A. Del-río-ortega, and A. Ruiz-cortés, Specification and automated design-time analysis of the business process human resource perspective, Inf. Syst, vol.52, pp.55-82, 2015.

A. Del-río-ortega, M. Resinas, C. Cabanillas, and A. Ruiz-cortés, Defining and analysing resource-aware process performance indicators, CEUR Workshop Proc, vol.998, pp.57-64, 2013.

Z. Huang, X. Lu, and H. Duan, Mining association rules to support resource allocation in business process management, vol.38, pp.9483-9490, 2011.

J. Nakatumba, Resource-aware business process management: analysis and support, 2013.

D. Knuplesch, L. T. Ly, S. Rinderle-ma, H. Pfeifer, and P. Dadam, On Enabling Data-Aware Compliance Checking of Business, 2010.

D. Borrego and I. Barba, Conformance checking and diagnosis for declarative business process models in data-aware scenarios, Expert Syst. Appl, vol.41, issue.11, pp.5340-5352, 2014.

M. Salnitri, F. Dalpiaz, and P. Giorgini, Modeling and verifying security policies in business processes, Lecture Notes in Business Information Processing, vol.175, pp.200-214, 2014.

L. Compagna, D. R. Santos, S. E. Ponta, and S. Ranise, Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol.9636, pp.567-572, 2016.

G. Karjoth, Aligning Security and Business Objectives for Process-Aware Information Systems, Proc. 5th ACM Conf. Data Appl. Secur. Priv. -CODASPY '15, pp.243-243, 2015.

C. Combi, L. Viganò, and M. Zavatteri, Security Constraints in Temporal Role-Based, Codaspy, pp.207-218, 2016.

A. Vijay, Security for workflow systems, Inf. Secur. Tech. Rep, vol.6, issue.2, pp.59-68, 2001.

M. C. Mont and R. Thyne, Privacy policy enforcement in enterprises with identity management solutions, J. Comput. Secur, vol.16, issue.2, pp.133-163, 2008.

M. C. Mont and R. Thyne, A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises information lifecycle management A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises, Policy, pp.118-134, 2006.

A. R. Khan, Access control in cloud computing environment, ARPN J. Eng. Appl. Sci, vol.7, issue.5, pp.613-615, 2012.

A. Alshehri and R. Sandhu, Access Control Models for Virtual Object Communication in Cloud-Enabled IoT, 2017 IEEE International Conference on Information Reuse and Integration (IRI), 2017.

J. Warner and V. Atluri, Inter-instance authorization constraints for secure workflow management, p.190, 2006.

D. Basin and E. T. Zurich, Optimal Workflow-Aware Authorizations, Proc. 17th ACM Symp, pp.93-102, 2012.

K. Tan, J. Crampton, and C. A. Gunter, The Consistency of Task-Based Authorization Constraints in Workflow Systems, Proc. 17th IEEE Comput. Secur. Found. Work, pp.155-169, 2004.

A. Tealeb, A. Awad, and G. Galal-edeen, Context-based variant generation of business process models, Lecture Notes in Business Information Processing, vol.175, 2014.

R. Lu, S. Sadiq, and G. Governatori, On Managing Business Processes Variants ?, 2009.

H. Groefsema, Business Process Variability A:A Study into Process Management and Verification, 2016.

H. Groefsema and D. Bucur, A Survey of Formal Business Process Verification: From Soundness to Variability, Proc. Third Int. Symp. Bus. Model. Softw. Des, pp.198-203, 2013.

J. P. Kasse, L. Xu, P. T. De-vrieze, and B. Yuwei, Process Driven Access Control and Authorisation Approach, 2019.

J. P. Kasse, L. Xu, P. T. De-vrieze, and B. Yuwei, The Need for Compliance Verification in Collaborative Business Processes, Work. Conf. Virtual Enterp, pp.217-229, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02191197

J. P. Kasse, L. Xu, and P. De-vrieze, A comparative survey of Business Process Verification Methods and Tools, Work. Conf. Virtual Enterp, pp.355-367, 2017.

F. Baader, Basic Description Logics, Theory Implementations Appl. Cambridge, 2003.

C. Cabanillas, M. Resinas, A. Del-río-ortega, and A. Ruiz-cortés, Specification and automated design-time analysis of the business process human resource perspective, Inf. Syst, vol.52, pp.55-82, 2015.

G. Lowe, Specification of communicating processes: Temporal logic versus refusalsbased refinement, Form. Asp. Comput, vol.20, issue.3, pp.277-294, 2008.

N. Russell, A. H. Hofstede, D. Edmond, W. M. Van-der, and . Aalst, Workflow data patterns, Business, vol.66, pp.2004-2005, 2004.