All Stories

  1. Advisory
  2. Smart contract languages: A multivocal mapping study.
  3. AMADEUS
  4. CyberSPL: A Framework for the Verification of Cybersecurity Policy Compliance of System Configurations Using Software Product Lines
  5. A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices
  6. Measuring data-centre workflows complexity through process mining: the Google cluster case
  7. Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models
  8. DMN for Data Quality Measurement and Assessment
  9. Process mining to unleash variability management
  10. Business Process Configuration according to Data Dependency Specification
  11. Business Process Configuration according to Data Dependency Specification
  12. FABIOLA: Towards the Resolution of Constraint Optimization Problems in Big Data Environment
  13. Governance Knowledge Management and Decision Support Using Fuzzy Governance Maps
  14. Guiding the Creation of Choreographed Processes with Multiple Instances Based on Data Models
  15. A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models
  16. Formalization of security patterns as a means to infer security controls in business processes
  17. OPBUS: A framework for improving the dependability of risk-aware business processes
  18. Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
  19. CombiS-BP editor: Combining declarative and imperative languages in BP modelling: Demonstration paper
  20. A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
  21. Improvement of Optimization Agreements in Business Processes Involving Web Services
  22. CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework
  23. Contract-based test generation for data flow of business processes using constraint programming
  24. A Model-Driven engineering approach with diagnosis of non-conformance of security objectives in business process models
  25. Towards Dependable Business Processes with Fault-Tolerance Approach
  26. A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
  27. OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes
  28. AFPL2, an Abstract Language for Firewall ACLs with NAT Support
  29. MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
  30. Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
  31. Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets