Author of the publication

Desiderata for Languages to be Used in the Defnition of Reference Business Processes.

, , , , and . Int. J. Software and Informatics, 1 (1): 37-65 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Ontologies to Quantify Attack Surfaces., , , , , and . STIDS, volume 1788 of CEUR Workshop Proceedings, page 10-18. CEUR-WS.org, (2016)Specifying and verifying requirements for election processes., , , and . DG.O, volume 289 of ACM International Conference Proceeding Series, page 63-72. Digital Government Research Center, (2008)Insider Threat Identification by Process Analysis., , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 251-264. IEEE Computer Society, (2014)Generation, composition, and verification of families of human-intensive systems., and . SPLC, page 207-216. ACM, (2014)Modeling and Analyzing Faults to Improve Election Process Robustness., , , , , , , and . EVT/WOTE, USENIX Association, (2010)Representing Process Variation with a Process Family., , and . ICSP, volume 4470 of Lecture Notes in Computer Science, page 109-120. Springer, (2007)Characterizing process variation., and . ICSE, page 836-839. ACM, (2011)Desiderata for Languages to be Used in the Defnition of Reference Business Processes., , , , and . Int. J. Software and Informatics, 1 (1): 37-65 (2007)Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example., , , , , , , and . ACM Trans. Priv. Secur., 20 (2): 5:1-5:31 (2017)Categorizing and modeling variation in families of systems: a position paper., and . ECSA Companion Volume, page 316-323. ACM, (2010)