Report date: Apr 30, 2024 Conflict count: 350192 Publisher: Walter de Gruyter GmbH Title count: 137 Conflict count: 1877 ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082269 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Matulevičius, 55 ,6,225,2013,Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns DOI: 10.1524/itit.2013.2002(Journal) (6082269-N ) DOI: 10.1515/itit.2013.2002(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082270 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Böhr, 55 ,6,217,2013,Business Process Security Analysis – Design Time, Run Time, Audit Time DOI: 10.1524/itit.2013.2001(Journal) (6082270-N ) DOI: 10.1515/itit.2013.2001(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082271 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Accorsi, 55 ,6,215,2013,Security in Business Process Management DOI: 10.1524/itit.2013.9006(Journal) (6082271-N ) DOI: 10.1515/itit.2013.9006(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082272 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Governatori, 55 ,6,231,2013,Business Process Compliance: An Abstract Normative Framework DOI: 10.1524/itit.2013.2003(Journal) (6082272-N ) DOI: 10.1515/itit.2013.2003(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082273 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Brucker, 55 ,6,239,2013,Integrating Security Aspects into Business Process Models DOI: 10.1524/itit.2013.2004(Journal) (6082273-N ) DOI: 10.1515/itit.2013.2004(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082274 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Strembeck, 55 ,6,247,2013,Security and Privacy in Business Processes: A Posteriori Analysis Techniques DOI: 10.1524/itit.2013.2005(Journal) (6082274-N ) DOI: 10.1515/itit.2013.2005(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082275 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Adriansyah, 55 ,6,255,2013,Privacy Analysis of User Behavior Using Alignments DOI: 10.1524/itit.2013.2006(Journal) (6082275-N ) DOI: 10.1515/itit.2013.2006(Journal)