Security and Privacy in Business Processes: A Posteriori Analysis Techniques
Keyword(s):
AbstractIn this paper, we motivate the need to perform a posteriori analyzes for process-related security properties. In particular, we first discuss the relation of security engineering and a-posteriori techniques. Subsequently, we give an overview of different a-posteriori techniques for analyzing organizational structures and access control policies. Finally, we provide a discussion on application scenarios for different a-posteriori techniques.
Keyword(s):
2016 ◽
Vol 5
(1)
◽
pp. 55-74
◽
2015 ◽
Vol 162
(5)
◽
pp. 1919-1933
◽
Keyword(s):
On the unilateral contact between membranes. Part 2: a posteriori analysis and numerical experiments
2011 ◽
Vol 32
(3)
◽
pp. 1147-1172
◽
Keyword(s):
2013 ◽
Vol 94
(9)
◽
pp. 826-849
◽
2013 ◽
Vol 267
◽
pp. 1-22
◽