@dblp

Modelling and transforming security constraints in privacy-aware business processes.

, , and . SOCA, page 1-4. IEEE Computer Society, (2011)

Links and resources

Tags