Modelling and transforming security constraints in privacy-aware business processes.
Jutta A. MülleSilvia von StackelbergKlemens BöhmPublished in: SOCA (2011)
Keyphrases
- business processes
- privacy aware
- business process
- role based access control
- personal information
- process model
- workflow processes
- web services
- data centric
- access control
- privacy preservation
- intrusion detection
- workflow systems
- workflow management systems
- service oriented architecture
- security policies
- data privacy
- privacy policies
- data security
- security issues
- security requirements
- workflow management
- location based services
- information security