Author of the publication

A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes.

, , , , and . CISIS/ICEUTE/SOCO Special Sessions, volume 189 of Advances in Intelligent Systems and Computing, page 13-23. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diagnosing correctness of semantic workflow models., , , and . Data Knowl. Eng., (2013)Data-Oriented Declarative Language for Optimizing Business Processes., , and . ISD, page 59-72. Springer, (2013)A Semiquantitative Approach to Study Semiqualitative Systems., , , and . IBERAMIA, volume 2527 of Lecture Notes in Computer Science, page 303-312. Springer, (2002)Diagnosis de Sistemas Dinámicos Basada en Aprendizaje Supervisado Off-Line., , , and . Computación y Sistemas, (2002)NMUS: Structural Analysis for Improving the Derivation of All MUSes in Overconstrained Numeric CSPs., , , and . CAEPIA, volume 4788 of Lecture Notes in Computer Science, page 160-169. Springer, (2007)Prognosing the Compliance of Declarative Business Processes Using Event Trace Robustness., , , and . OTM Conferences, volume 8841 of Lecture Notes in Computer Science, page 327-344. Springer, (2014)Guiding the Creation of Choreographed Processes with Multiple Instances Based on Data Models., , , and . Business Process Management Workshops, volume 281 of Lecture Notes in Business Information Processing, page 239-251. (2016)Using Constraint Programming in Selection Operators for Constraint Databases., and . Expert Syst. Appl., 41 (15): 6773-6785 (2014)Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets., , , and . SECURWARE, page 53-61. IEEE Computer Society, (2008)Formalization of security patterns as a means to infer security controls in business processes., and . Logic Journal of the IGPL, 23 (1): 57-72 (2015)