2013
DOI: 10.1007/978-3-642-36285-9_67
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Wizard for Confidential Business Processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…(Accorsi et al, 2011a), (Accorsi et al, 2011b), (Accorsi et al, 2012), (Fenz et al, 2009), , (Lehmann et al, 2013), and (Lohmann et al, 2009)) and confidentiality determination methods implemented as part of different risk assessment methods (e.g., NIST (Barker et al, 2008a), Magerit (Spanish Ministry for Public Administrations, 2006), and Mehari (CLUSIF, 2010)). When dealing with confidentiality requirements in business processes one of the first decisions to make is the level to which each asset should be protected.…”
Section: Related Workmentioning
confidence: 99%
“…(Accorsi et al, 2011a), (Accorsi et al, 2011b), (Accorsi et al, 2012), (Fenz et al, 2009), , (Lehmann et al, 2013), and (Lohmann et al, 2009)) and confidentiality determination methods implemented as part of different risk assessment methods (e.g., NIST (Barker et al, 2008a), Magerit (Spanish Ministry for Public Administrations, 2006), and Mehari (CLUSIF, 2010)). When dealing with confidentiality requirements in business processes one of the first decisions to make is the level to which each asset should be protected.…”
Section: Related Workmentioning
confidence: 99%