Home Mathematics it - Information Technology Volume 55, Issue 6 - Business Process Security Analysis – Design Time, Run Time, Audit Time
it - Information Technology
Issue Open Access

Volume 55, Issue 6 - Business Process Security Analysis – Design Time, Run Time, Audit Time

it - Information Technology
This issue is in the journal

Contents
  • Masthead
  • Publicly Available
    Masthead
    December 1, 2013
    Page range: 213-214
  • Editorial
  • Requires Authentication Unlicensed
    Licensed
    Security in Business Process Management
    December 19, 2013
    Rafael Accorsi
    Page range: 215-216
  • Schwerpunkt
  • Requires Authentication Unlicensed
    Licensed
    Business Process Security Analysis – Design Time, Run Time, Audit Time
    December 19, 2013
    Frank Böhr, Linh Thao Ly, Günter Müller
    Page range: 217-224
  • December 19, 2013
    Raimundas Matulevičius, Naved Ahmed
    Page range: 225-230
  • Requires Authentication Unlicensed
    Licensed
    Business Process Compliance: An Abstract Normative Framework
    December 19, 2013
    Guido Governatori
    Page range: 231-238
  • Requires Authentication Unlicensed
    Licensed
    Integrating Security Aspects into Business Process Models
    December 19, 2013
    Achim D. Brucker
    Page range: 239-246
  • Requires Authentication Unlicensed
    Licensed
    Security and Privacy in Business Processes: A Posteriori Analysis Techniques
    December 19, 2013
    Mark Strembeck, Stefanie Rinderle-Ma
    Page range: 247-254
  • Requires Authentication Unlicensed
    Licensed
    Privacy Analysis of User Behavior Using Alignments
    December 19, 2013
    Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone
    Page range: 255-260
Downloaded on 23.10.2025 from https://www.degruyterbrill.com/journal/key/itit/55/6/html
Scroll to top button