Login / Signup

Modelling and transforming security constraints in privacy-aware business processes.

Jutta A. MülleSilvia von StackelbergKlemens Böhm
Published in: SOCA (2011)
Keyphrases