1. R. Accorsi, A. Lehmann, Automatic information flow analysis of business process models, in: BPM 2012, Lecture Notes in Computer Science, vol. 7481, Springer, Heidelberg, Germany, 2012, pp. 172–187.
2. Vulnerability analysis in SOA-based business processes;Lowis;IEEE Trans. Serv. Comput.,2011
3. ISO/IEC, ISO/IEC Information Security Management System 27001, 2005 〈www.27000.org/iso-27001.htm〉.
4. DoD, Trusted computer security evaluation criteria, 1983 〈http://csrc.nist.gov/publications/histroy/dod85.pdf〉.
5. Automated analysis of infinite state workflows with access control policies;Armando,2012