Artikel
Öffentlich zugänglich
Masthead
Veröffentlicht/Copyright:
1. Dezember 2013
Published Online: 2013-12-1
Published in Print: 2013-12-17
©2013 by Walter de Gruyter Berlin Boston
Artikel in diesem Heft
- Masthead
- Security in Business Process Management
- Business Process Security Analysis – Design Time, Run Time, Audit Time
- Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns
- Business Process Compliance: An Abstract Normative Framework
- Integrating Security Aspects into Business Process Models
- Security and Privacy in Business Processes: A Posteriori Analysis Techniques
- Privacy Analysis of User Behavior Using Alignments
- Masthead
- Masthead
- Editorial
- Security in Business Process Management
- Schwerpunkt
- Business Process Security Analysis – Design Time, Run Time, Audit Time
- Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns
- Business Process Compliance: An Abstract Normative Framework
- Integrating Security Aspects into Business Process Models
- Security and Privacy in Business Processes: A Posteriori Analysis Techniques
- Privacy Analysis of User Behavior Using Alignments
Artikel in diesem Heft
- Masthead
- Security in Business Process Management
- Business Process Security Analysis – Design Time, Run Time, Audit Time
- Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns
- Business Process Compliance: An Abstract Normative Framework
- Integrating Security Aspects into Business Process Models
- Security and Privacy in Business Processes: A Posteriori Analysis Techniques
- Privacy Analysis of User Behavior Using Alignments
- Masthead
- Masthead
- Editorial
- Security in Business Process Management
- Schwerpunkt
- Business Process Security Analysis – Design Time, Run Time, Audit Time
- Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns
- Business Process Compliance: An Abstract Normative Framework
- Integrating Security Aspects into Business Process Models
- Security and Privacy in Business Processes: A Posteriori Analysis Techniques
- Privacy Analysis of User Behavior Using Alignments