Author of the publication

Modelling Security Goals in Business Processes.

, , and . Modellierung, volume P-127 of LNI, page 197-212. GI, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling Security Goals in Business Processes., , and . Modellierung, volume P-127 of LNI, page 197-212. GI, (2008)Access Control for Cross-Organisational Web Service Composition, , and . Proc. 2nd Workshop SIS, (2007)Trust Indicator Integration into SLAs for Virtual Organisations, and . Proceedings of eChallenges 2007 Conference, (2007)SOA Security - Secure Cross-Organizational Service Composition, , , and . Proc. Stuttgarter Softwaretechnik Forum (SSF), page 41-53. Stuttgart, Fraunhofer IRB-Verlag, (November 2007)ISBN 978-3-8167-7493-8.Collaborative Workflow Management for eGovernment, , and . dexa, (2007)A Transformation Approach for Security Enhanced Business Processes, , and . Proc. SE2008 of 26th IASTED International Multi-Conference, (February 2008)to appear.Modelling Security Goals in Business Processes. (March 2008)