Home  | Impressum | Datenschutz | Sitemap | KIT

Modelling and Transforming Security Constraints in Privacy-Aware Business Processes

Modelling and Transforming Security Constraints in Privacy-Aware Business Processes
Autor:

Jutta Mülle, Silvia von Stackelberg, Klemens Böhm

Quelle:

IEEE International Conference on Service Oriented Computing and Applications (SOCA 2011)

Datum: Dezember 2011