1. Accorsi, R.: Automated Privacy Audits to Complement the Notion of Control for Identity Management. In: de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.) Policies and Research in Identity Management, IFIP, vol. 261. Springer, Heidelberg (2008)
2. Accorsi, R.: Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. In: Proceedings IMF 2009, September 2009, pp. 94–110 (2009)
3. Accorsi, R., Wonnemann, C.: Detective information flow analysis for business processes. In: BPSC, pp. 223–224 (2009)
4. Bace, J., Rozwell, C., Feiman, J., Kirwin, B.: Understanding the costs of compliance. Technical report, Gartner Research (July 2006)
5. Barletta, M., Ranise, S., Viganò, L.: Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. In: CSE (3), pp. 289–296 (2009)