Author:
Voglhofer Thomas,Rinderle-Ma Stefanie
Publisher
Springer Science and Business Media LLC
Reference78 articles.
1. Ahmed N, Matulevičius R (2014) Securing business processes using security risk-oriented patterns. Comput Stand Interfaces 36(4):723–733
2. AnaCredit. Regulation (EU) 2016/867 of the European Central Bank of 18 May 2016 on the collection of granular credit and credit risk data (ECB/2016/13).
https://www.ecb.europa.eu/ecb/legal/pdf/celex_32016r0867_en_txt.pdf
. Accessed 13 Dec 2017
3. Awad A (2010) A compliance management framework for business process models. PhD thesis, University of Potsdam
4. Awad A, Weske M (2010) Visualization of compliance violation in business process models. In: BPM 2009 international workshops on business process management workshops, Ulm, Germany, September 7, 2009. Revised Papers. Springer, Heidelberg, pp 182–193
5. Awad A, Smirnov S, Weske M (2009) Resolution of compliance violation in business process models: A planning-based approach. In: Proceedings OTM 2009: confederated international conferences on the move to meaningful internet systems, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Part I, pp 6–23
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献