LZI - Schloss Dagstuhl - Talks + Materials of Seminar 13341

Seminar 13341
Verifiably Secure Process-Aware Information Systems

Rafael Accorsi (Universität Freiburg, DE), Jason Crampton (RHUL - London, GB), Michael Huth (Imperial College London, GB), Stefanie Rinderle-Ma (Universität Wien, AT)

Caveat: Due to caching problems of dynamic webpages, sometimes newly
uploaded files are not shown. Please reload the page accordingly.


Seminar Wide Materials

Rafael Accorsi , Universität Freiburg

Lujo Bauer , Carnegie Mellon University

Anne Baumgrass , Hasso-Plattner-Institut - Potsdam
 Deriving RBAC models from process models and logs
Abstracts: txt Slides: pdf


Nataliia Bielova , INRIA Bretagne Atlantique - Rennes
 Better enforce than verify! How to ensure compliance of business processes at runtime
Abstracts: txt Slides: pdf


Achim D. Brucker , SAP Research - Karlsruhe
 Security in the Context of Business Processes: Thoughts from a System Vendor's Perspective
Abstracts: txt Slides: pdf


David Cohen , Royal Holloway University of London

Jason Crampton , Royal Holloway University of London

Christopher Dearlove , BAE Systems - Chelmsford

Guido Governatori , NICTA - Brisbane
 The Dos and Don'ts of Business Process Compliance
Abstracts: txt Slides: pdf


Christian Guenther , Fluxicon Process Laboratories
 On Software Design
Slides: pdf


Gregory Z. Gutin , Royal Holloway University of London

Michael Huth , Imperial College London
 Policy-Based Numerical Aggregation of Trust Evidence
Abstracts: txttxt Slides: pdf


Fuyuki Ishikawa , National Institute of Informatics - Tokyo
 Formal Methods with Industry?
Abstracts: txt Slides: pdf


Limin Jia , Carnegie Mellon University
 Policy Auditing over Incomplete Logs: Theory, Implementation and Applications
Abstracts: txt Slides: pdf


Mark Jones , Royal Holloway University of London

Guenter Karjoth , Hochschule Luzern

Felix Klaedtke , ETH Zürich
 Checking System Compliance by Slicing and Monitoring Logs
Abstracts: txt Slides: pdf Paper: pdf


Agnes Koschmider , KIT - Karlsruher Institut für Technologie

Jim Huan Pu Kuo , Imperial College London

Andreas Lehmann , Vattenfall Europe Netzservice GmbH
 Information Flow Security for Business Processes - just one click away
Abstracts: txt Slides: pdf


Niels Lohmann , Universität Rostock
 Correct PAIS - A Naive Academic View
Abstracts: txt Slides: pdf


Raimundas Matulevicius , University of Tartu

Marco Montali , Free University of Bozen-Bolzano
 Data-Aware Business Processes: Formalization and Reasoning Support
Abstracts: txt Slides: pdf


Charles Morisset , Newcastle University
 Automatic Analysis and Certification of Policy Safety
Abstracts: txt Slides: pdf


Alessandro Mosca , Free University of Bozen-Bolzano

Michael Norrish , NICTA - Canberra
 Trading Efficiency/Decidability for Expressiveness: Architecture Modeling with Fitzroy
Abstracts: txt Slides: pdf


Andreas Oberweis , KIT - Karlsruher Institut für Technologie

Alexander Paar , TWT GmbH Science and Innovation

Stefanie Rinderle-Ma , Universität Wien

Anne Rozinat , Fluxicon Process Laboratories
 Process Mining: Discovering Process Maps from Data
Abstracts: txt Slides: pdf


Thomas Stocker , Universität Freiburg

Mark Strembeck , Wirtschaftsuniversität Wien

Meike Ullrich , KIT - Karlsruher Institut für Technologie

Matthias Weidlich , Technion
 Interval-based Process Monitoring for Uncertain Event Streams
Abstracts: txt Slides: pdf


Edgar Weippl , Secure Business Austria Research
 Preserving demanded privacy constraints:
Abstracts: txt Slides: pdf


Nicola Zannone , TU Eindhoven

Uwe Zdun , Universität Wien

Maria Zhdanova , Fraunhofer SIT - Darmstadt


Creative Commons License
This webpage and the material that is made available on this webpage is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License.

The CC by-nc-nd license allows you to copy, distribute and transmit the work under the following conditions: