LZI - Schloss Dagstuhl - Talks + Materials of Seminar 13341
 Functions: 

Seminar 13341
Verifiably Secure Process-Aware Information Systems

Rafael Accorsi (Universität Freiburg, DE), Jason Crampton (RHUL - London, GB), Michael Huth (Imperial College London, GB), Stefanie Rinderle-Ma (Universität Wien, AT)

Caveat: Due to caching problems of dynamic webpages, sometimes newly
uploaded files are not shown. Please reload the page accordingly.

 

Seminar Wide Materials
 
 


Rafael Accorsi , Universität Freiburg
 

Lujo Bauer , Carnegie Mellon University
 

Anne Baumgrass , Hasso-Plattner-Institut - Potsdam
 Deriving RBAC models from process models and logs
Abstracts: txt Slides: pdf

 

Nataliia Bielova , INRIA Bretagne Atlantique - Rennes
 Better enforce than verify! How to ensure compliance of business processes at runtime
Abstracts: txt Slides: pdf

 

Achim D. Brucker , SAP Research - Karlsruhe
 Security in the Context of Business Processes: Thoughts from a System Vendor's Perspective
Abstracts: txt Slides: pdf

 

David Cohen , Royal Holloway University of London
 

Jason Crampton , Royal Holloway University of London
 

Christopher Dearlove , BAE Systems - Chelmsford
 

Guido Governatori , NICTA - Brisbane
 The Dos and Don'ts of Business Process Compliance
Abstracts: txt Slides: pdf

 

Christian Guenther , Fluxicon Process Laboratories
 On Software Design
Slides: pdf

 

Gregory Z. Gutin , Royal Holloway University of London
 

Michael Huth , Imperial College London
 Policy-Based Numerical Aggregation of Trust Evidence
Abstracts: txttxt Slides: pdf

 

Fuyuki Ishikawa , National Institute of Informatics - Tokyo
 Formal Methods with Industry?
Abstracts: txt Slides: pdf

 

Limin Jia , Carnegie Mellon University
 Policy Auditing over Incomplete Logs: Theory, Implementation and Applications
Abstracts: txt Slides: pdf

 

Mark Jones , Royal Holloway University of London
 

Guenter Karjoth , Hochschule Luzern
 

Felix Klaedtke , ETH Zürich
 Checking System Compliance by Slicing and Monitoring Logs
Abstracts: txt Slides: pdf Paper: pdf

 

Agnes Koschmider , KIT - Karlsruher Institut für Technologie
 

Jim Huan Pu Kuo , Imperial College London
 

Andreas Lehmann , Vattenfall Europe Netzservice GmbH
 Information Flow Security for Business Processes - just one click away
Abstracts: txt Slides: pdf

 

Niels Lohmann , Universität Rostock
 Correct PAIS - A Naive Academic View
Abstracts: txt Slides: pdf

 

Raimundas Matulevicius , University of Tartu
 

Marco Montali , Free University of Bozen-Bolzano
 Data-Aware Business Processes: Formalization and Reasoning Support
Abstracts: txt Slides: pdf

 

Charles Morisset , Newcastle University
 Automatic Analysis and Certification of Policy Safety
Abstracts: txt Slides: pdf

 

Alessandro Mosca , Free University of Bozen-Bolzano
 

Michael Norrish , NICTA - Canberra
 Trading Efficiency/Decidability for Expressiveness: Architecture Modeling with Fitzroy
Abstracts: txt Slides: pdf

 

Andreas Oberweis , KIT - Karlsruher Institut für Technologie
 

Alexander Paar , TWT GmbH Science and Innovation
 

Stefanie Rinderle-Ma , Universität Wien
 

Anne Rozinat , Fluxicon Process Laboratories
 Process Mining: Discovering Process Maps from Data
Abstracts: txt Slides: pdf

 

Thomas Stocker , Universität Freiburg
 

Mark Strembeck , Wirtschaftsuniversität Wien
 

Meike Ullrich , KIT - Karlsruher Institut für Technologie
 

Matthias Weidlich , Technion
 Interval-based Process Monitoring for Uncertain Event Streams
Abstracts: txt Slides: pdf

 

Edgar Weippl , Secure Business Austria Research
 Preserving demanded privacy constraints:
Abstracts: txt Slides: pdf

 

Nicola Zannone , TU Eindhoven
 

Uwe Zdun , Universität Wien
 

Maria Zhdanova , Fraunhofer SIT - Darmstadt
 



License

Creative Commons License
This webpage and the material that is made available on this webpage is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License.

The CC by-nc-nd license allows you to copy, distribute and transmit the work under the following conditions: