Login / Signup
Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions.
Julius Holderer
Josep Carmona
Farbod Taymouri
Günter Müller
Published in:
Trans. Petri Nets Other Model. Concurr. (2017)
Keyphrases
</>
security properties
security requirements
security vulnerabilities
workflow models
access control
security problems
security policies
security mechanisms
database systems
workflow model
workflow systems
information security
security model
functional requirements
data flow
business process
database