Author of the publication

Formalization of security patterns as a means to infer security controls in business processes.

, and . Logic Journal of the IGPL, 23 (1): 57-72 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formalization of security patterns as a means to infer security controls in business processes., and . Logic Journal of the IGPL, 23 (1): 57-72 (2015)A Semiquantitative Approach to Study Semiqualitative Systems., , , and . IBERAMIA, volume 2527 of Lecture Notes in Computer Science, page 303-312. Springer, (2002)Self-Adaptative Troubleshooting for to Guide Resolution of Malfunctions in Aircraft Manufacturing., , , , , and . IEEE Access, (2021)Prognosis of multiple instances in time-aware declarative business process models., , and . Comput. Ind., (2020)Diagnosis de Sistemas Dinámicos Basada en Aprendizaje Supervisado Off-Line., , , and . Computación y Sistemas, (2002)Qualitative Reasoning for Software Development Project by Constraint Programming., , , and . ICEIS (1), page 481-488. (2001)Communicating between the kernel and user-space in Linux using Netlink sockets., , and . Softw. Pract. Exp., 40 (9): 797-810 (2010)Minimizing test-point allocation to improve diagnosability in business process models., , and . J. Syst. Softw., 86 (11): 2725-2741 (2013)A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes., , , , and . CISIS/ICEUTE/SOCO Special Sessions, volume 189 of Advances in Intelligent Systems and Computing, page 13-23. Springer, (2012)CombiS-BP editor: Combining declarative and imperative languages in BP modelling: Demonstration paper., , , and . RCIS, page 1-2. IEEE, (2013)