Login / Signup

On the Modeling and Verification of Security-Aware and Process-Aware Information Systems.

Jason CramptonMichael Huth
Published in: Business Process Management Workshops (2) (2011)
Keyphrases
  • information systems
  • information security
  • intrusion detection
  • health care
  • security issues
  • neural network
  • data mining
  • face recognition
  • access control
  • cloud computing
  • model checking
  • formal verification
  • taking care