Report date: Nov 6,2024 Conflict count: 361874 Publisher: Oldenbourg Wissenschaftsverlag Title count: 19 Conflict count: 397 ========================================================== Created: 2014-01-25 15:15:13 ConfID: 4595717 CauseID: 1363847930 JT: it - Information Technology MD: Zemanek,16,1-6,,1974,Editorial DOI: 10.1524/itit.1974.16.16.43(Journal) (4595717-N) DOI: 10.1524/itit.1974.16.16.7(Journal) ========================================================== Created: 2014-01-25 15:15:03 ConfID: 4513795 CauseID: 1363847928 JT: it - Information Technology MD: ,3,1-6,,1961,Buchbesprechungen DOI: 10.1524/itit.1961.3.16.266(Journal) (4513795-N) DOI: 10.1524/itit.1961.3.16.40(Journal) DOI: 10.1524/itit.1961.3.16.86(Journal) ========================================================== Created: 2014-01-23 09:43:24 ConfID: 4536931 CauseID: 1363813085 OtherID: 1363865140,1363865141 JT: it - Information Technology MD: ,9,1-6,,1967,Buchbesprechungen DOI: 10.1524/itit.1967.9.16.239(Journal) (4536931-N) DOI: 10.1524/itit.1967.9.16.99(Journal) DOI: 10.1524/itit.1967.9.16.280(Journal) DOI: 10.1524/itit.1967.9.16.46(Journal) ========================================================== Created: 2021-06-22 11:43:02 ConfID: 6082269 CauseID: 1501536196 JT: it - Information Technology MD: Matulevičius,55,6,225,2013,Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns DOI: 10.1524/itit.2013.2002(Journal) (6082269-N) ========================================================== Created: 2021-06-22 11:43:02 ConfID: 6082270 CauseID: 1501536196 JT: it - Information Technology MD: Böhr,55,6,217,2013,Business Process Security Analysis – Design Time, Run Time, Audit Time DOI: 10.1524/itit.2013.2001(Journal) (6082270-N) ========================================================== Created: 2021-06-22 11:43:02 ConfID: 6082271 CauseID: 1501536196 JT: it - Information Technology MD: Accorsi,55,6,215,2013,Security in Business Process Management DOI: 10.1524/itit.2013.9006(Journal) (6082271-N) ========================================================== Created: 2021-06-22 11:43:02 ConfID: 6082272 CauseID: 1501536196 JT: it - Information Technology MD: Governatori,55,6,231,2013,Business Process Compliance: An Abstract Normative Framework DOI: 10.1524/itit.2013.2003(Journal) (6082272-N) ========================================================== Created: 2021-06-22 11:43:02 ConfID: 6082273 CauseID: 1501536196 JT: it - Information Technology MD: Brucker,55,6,239,2013,Integrating Security Aspects into Business Process Models DOI: 10.1524/itit.2013.2004(Journal) (6082273-N) ========================================================== Created: 2021-06-22 11:43:02 ConfID: 6082274 CauseID: 1501536196 JT: it - Information Technology MD: Strembeck,55,6,247,2013,Security and Privacy in Business Processes: A Posteriori Analysis Techniques DOI: 10.1524/itit.2013.2005(Journal) (6082274-N) ========================================================== Created: 2021-06-22 11:43:02 ConfID: 6082275 CauseID: 1501536196 JT: it - Information Technology MD: Adriansyah,55,6,255,2013,Privacy Analysis of User Behavior Using Alignments DOI: 10.1524/itit.2013.2006(Journal) (6082275-N) ========================================================== Created: 2014-01-25 15:15:08 ConfID: 4536079 CauseID: 1363847929 OtherID: 1363847929 JT: it - Information Technology MD: ,8,1-6,,1966,Buchbesprechungen DOI: 10.1524/itit.1966.8.16.312(Journal) (4536079-N) DOI: 10.1524/itit.1966.8.16.253(Journal) DOI: 10.1524/itit.1966.8.16.48(Journal)