Author of the publication

Privacy-Aware Workflow Management.

, , , and . Business Process Management, volume 444 of Studies in Computational Intelligence, Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hardware Virtualization Based Component Sandboxing Architecture., , and . J. Softw., 7 (9): 2107-2118 (2012)Security Metrics for Java Bytecode Programs (S)., , and . SEKE, page 394-399. Knowledge Systems Institute Graduate School, (2013)A LISP Implementation of the Model for 'Communicating Sequential Processes'.. Softw. Pract. Exp., 18 (10): 923-943 (1988)Reproducible Tests in CSP.. Aust. Comput. J., 19 (2): 92-98 (1987)Semantic characterisation of dead control-flow paths., , and . IEE Proc. Softw., 148 (6): 175-186 (2001)A Simple High-Precision 2-Port Vector Analyzer., , , , , , , and . IEEE Access, (2020)A Medical Data Reliability Assessment Model., , and . J. Theor. Appl. Electron. Commer. Res., 4 (2): 64-63 (2009)Business Object Centric Microservices Patterns., , , and . OTM Conferences, volume 11877 of Lecture Notes in Computer Science, page 476-495. Springer, (2019)A Limitation of Vector Timestamps for Reconstructing Distributed Computations.. Inf. Process. Lett., 68 (2): 87-91 (1998)A Formal Model of Real-Time Program Compilation., and . ARTS, volume 1601 of Lecture Notes in Computer Science, page 192-210. Springer, (1999)