Login / Signup
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems.
Jason Crampton
Michael Huth
Published in:
Business Process Management Workshops (2) (2011)
Keyphrases
</>
information systems
information security
intrusion detection
health care
security issues
neural network
data mining
face recognition
access control
cloud computing
model checking
formal verification
taking care