1. Accenture. (n.d.) (2014). Cloud Image Map [Web Site]. From Our cloud strategy approach: http://www.accenture.com/Microsites/cloudstrategy/documents/cloud_diagram/index.html
2. Accorsi, R. (2008): Automated privacy audits to complement the notion of control for identity management. Policies and Research in Identity Management, ser. IFIP Conference Proceedings, E. de Leeuw, S. Fischer-Hübner, J. Tseng, and J. Borking, Eds. Springer, 2008, vol. 261, pp. 39–48.
3. Automated certification for compliant cloud-based business processes.;R.Accorsi;Wirtschaftsinformatik,2011
4. Automated Privacy Audits Based on Pruning of Log Data
5. Accorsi, R., & Wonnemann, C. (2009). Detective information flow analysis for business processes. Business Processes, Services Computing and Intelligent Service Management, ser. Lecture Notes in Informatics, W. Abramowicz, L. Macaszek, R. Kowalczyk, and A. Speck, Eds. Springer, 2009, vol. 147, pp. 223–224