Managing Security Objects and -Processes Using an Extended BPM Approach and -System.
Jochen KüsterNiklaus MeyerHagen VölzerMaria DubovitskayaMichael OsborneAxel TannerPublished in: EDOC (2019)
Keyphrases
- business process management
- intrusion detection
- business processes
- process model
- security policies
- security systems
- statistical databases
- multiple objects
- database systems
- service management
- bounding box
- information security
- business process
- d objects
- spatial relationships
- object model
- computational models
- complex scenes
- image regions
- access control
- case study