2014
DOI: 10.1016/j.infsof.2013.12.004
|View full text |Cite
|
Sign up to set email alerts
|

A systematic review on security in Process-Aware Information Systems – Constitution, challenges, and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 55 publications
(41 citation statements)
references
References 66 publications
0
41
0
Order By: Relevance
“…Evaluation is used as a criterion for the construction of business process reference models in Fettke et al (2006). Lastly, a literature review by Leitner and Rinderle-Ma (2014) states that research evaluation is a challenge in the context of security in PAIS.…”
Section: Related Workmentioning
confidence: 99%
“…Evaluation is used as a criterion for the construction of business process reference models in Fettke et al (2006). Lastly, a literature review by Leitner and Rinderle-Ma (2014) states that research evaluation is a challenge in the context of security in PAIS.…”
Section: Related Workmentioning
confidence: 99%
“…The resource perspective also comprises the specification of securityrelated information at design time [23]. This implies defining the worklist and work item operations the resources are allowed to execute.…”
Section: Resource Perspective In the Development Of Paissmentioning
confidence: 99%
“…With the use of a visualization, we aim to support the easier identification and understanding of potential anomalies in order to evaluate insider threats (see [16]). Furthermore, the visualization should facilitate the investigation of RBAC differences such as policy updates or reconciliation.…”
Section: Visualization Of Potential Anomaliesmentioning
confidence: 99%