Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/soca/MulleSB11
%A Mülle, Jutta A.
%A von Stackelberg, Silvia
%A Böhm, Klemens
%B SOCA
%D 2011
%E Lin, Kwei-Jay
%E Huemer, Christian
%E Blake, M. Brian
%E Benatallah, Boualem
%I IEEE Computer Society
%K
%P 1-4
%T Modelling and transforming security constraints in privacy-aware business processes.
%U http://dblp.uni-trier.de/db/conf/soca/soca2011.html#MulleSB11
%@ 978-1-4673-0318-7
@inproceedings{conf/soca/MulleSB11,
added-at = {2023-12-12T19:07:07.000+0100},
author = {Mülle, Jutta A. and von Stackelberg, Silvia and Böhm, Klemens},
biburl = {https://www.bibsonomy.org/bibtex/238922f06aa1c69826d7264806c9b4451/admin},
booktitle = {SOCA},
crossref = {conf/soca/2011},
editor = {Lin, Kwei-Jay and Huemer, Christian and Blake, M. Brian and Benatallah, Boualem},
ee = {http://doi.ieeecomputersociety.org/10.1109/SOCA.2011.6166257},
interhash = {1c04ae9ae7ac5f5ede42f8d8bb713418},
intrahash = {38922f06aa1c69826d7264806c9b4451},
isbn = {978-1-4673-0318-7},
keywords = {},
pages = {1-4},
publisher = {IEEE Computer Society},
timestamp = {2023-12-12T19:07:07.000+0100},
title = {Modelling and transforming security constraints in privacy-aware business processes.},
url = {http://dblp.uni-trier.de/db/conf/soca/soca2011.html#MulleSB11},
year = 2011
}