Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Rafael Accorsi
2010 – today
- 2013
[j13]Rafael Accorsi, Raimundas Matulevicius: Workshop on Security in Business Processes - A workshop report. Enterprise Modelling and Information Systems Architectures 8(1): 75- (2013)
[j12]Thomas Stocker, Rafael Accorsi, Tobias Rother: Computergestützte Prozessauditierung mit Process Mining. HMD - Praxis Wirtschaftsinform. 292 (2013)
[j11]Rafael Accorsi: A secure log architecture to support remote auditing. Mathematical and Computer Modelling 57(7-8): 1578-1591 (2013)
[c28]
[c27]Rafael Accorsi, Thomas Stocker, Günter Müller: On the exploitation of process mining for security audits: the process discovery case. SAC 2013: 1462-1468
[c26]
[c25]Rafael Accorsi, Guenter Mueller: Preventive Inference Control in Data-centric Business Models. IEEE Symposium on Security and Privacy Workshops 2013: 28-33
[e2]Rafael Accorsi, Paolo Ceravolo, Philippé Cudre-Mauroux (Eds.): Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, Riva del Garda, Italy, August 30, 2013. CEUR Workshop Proceedings 1027, CEUR-WS.org 2013
[e1]Rafael Accorsi, Silvio Ranise (Eds.): Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings. Lecture Notes in Computer Science 8203, Springer 2013, ISBN 978-3-642-41097-0- 2012
[j10]Rafael Accorsi, Keyun Ruan: Challenges of Cloud Forensics: A Survey of the Missing Capabilities. ERCIM News 2012(90) (2012)
[j9]Rafael Accorsi, Meike Ullrich, Wil M. P. van der Aalst: Process Mining. Informatik Spektrum 35(5): 354-359 (2012)
[c24]Rafael Accorsi, Andreas Lehmann: Automatic Information Flow Analysis of Business Process Models. BPM 2012: 172-187
[c23]Rafael Accorsi, Thomas Stocker: On the exploitation of process mining for security audits: the conformance checking case. SAC 2012: 1709-1716- 2011
[j8]Rafael Accorsi, Lutz Lowis, Yoshinori Sato: Automated Certification for Compliant Cloud-based Business Processes. Business & Information Systems Engineering 3(3): 145-154 (2011)
[j7]Lutz Lowis, Rafael Accorsi: Vulnerability Analysis in SOA-Based Business Processes. IEEE T. Services Computing 4(3): 230-242 (2011)
[j6]Rafael Accorsi, Lutz Lowis, Yoshinori Sato: Automatisierte Compliance-Zertifizierung Cloud-basierter Geschäftsprozesse. Wirtschaftsinformatik 53(3): 139-149 (2011)
[c22]Rafael Accorsi, Claus Wonnemann, Sebastian Dochow: SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems. ARES 2011: 692-697
[c21]Rafael Accorsi: Business Process as a Service: Chances for Remote Auditing. COMPSAC Workshops 2011: 398-403
[c20]Rafael Accorsi, Claus Wonnemann: Forensic Leak Detection for Business Process Models. IFIP Int. Conf. Digital Forensics 2011: 101-113
[c19]Rafael Accorsi, Claus Wonnemann, Thomas Stocker: Towards Forensic Data Flow Analysis of Business Process Logs. IMF 2011: 3-20
[c18]
[c17]Rafael Accorsi, Thomas Stocker: Discovering Workflow Changes with Time-Based Trace Clustering. SIMPDA 2011: 154-168- 2010
[j5]Rafael Accorsi, Lutz Lowis: ComCert: Automated Certification of Cloud-based Business Processes. ERCIM News 2010(83): 50-51 (2010)
[j4]Günter Müller, Rafael Accorsi, Sebastian Höhn, Stefan Sackmann: Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten. Informatik Spektrum 33(1): 3-13 (2010)
[c16]Rafael Accorsi, Claus Wonnemann: Auditing Workflow Executions against Dataflow Policies. BIS 2010: 207-217
[c15]Rafael Accorsi, Claus Wonnemann: Static Information Flow Analysis of Workflow Models. ISSS/BPSC 2010: 194-205
[c14]
[c13]Rafael Accorsi, Claus Wonnemann: InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements. STM 2010: 194-209
2000 – 2009
- 2009
[c12]Rafael Accorsi, Claus Wonnemann: Detective Information Flow Analysis for Business Processes. BPSC 2009: 223-224
[c11]Claus Wonnemann, Rafael Accorsi, Günter Müller: On Information Flow Forensics in Business Application Scenarios. COMPSAC (2) 2009: 324-328
[c10]Rafael Accorsi: Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer? COMPSAC (2) 2009: 398-403
[c9]Lutz Lowis, Rafael Accorsi: On a Classification Approach for SOA Vulnerabilities. COMPSAC (2) 2009: 439-444
[c8]Rafael Accorsi, Ernesto Damiani, Frank Innerhofer-Oberperfler, Florian Kerschbaum: Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09). EDOCW 2009: 166-167
[c7]Rafael Accorsi: Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. IMF 2009: 94-110- 2008
[b1]Rafael Accorsi: Automated counterexample-driven audits of authentic system records. University of Freiburg 2008
[j3]Rafael Accorsi, Yoshinori Sato, Satoshi Kai: Compliance-Monitor zur Frühwarnung vor Risiken. Wirtschaftsinformatik 50(5): 375-382 (2008)
[c6]Rafael Accorsi, Thomas Stocker: Automated Privacy Audits Based on Pruning of Log Data. EDOCW 2008: 175-182
[c5]Jens Strüker, Rafael Accorsi, Günter Müller: On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail. CEC/EEE 2008: 44-49- 2007
[c4]Rafael Accorsi: Automated Privacy Audits to Complement the Notion of Control for Identity Management. IDMAN 2007: 39-48- 2006
[j2]Stefan Sackmann, Jens Strüker, Rafael Accorsi: Personalization in privacy-aware highly dynamic systems. Commun. ACM 49(9): 32-38 (2006)
[c3]Rafael Accorsi: On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. SEC 2006: 329-339
[c2]Rafael Accorsi, Adolf Hohl: Delegating Secure Logging in Pervasive Computing Systems. SPC 2006: 58-72- 2001
[j1]Rafael Accorsi, David A. Basin, Luca Viganò: Towards an awareness-based semantics for security protocol analysis. Electr. Notes Theor. Comput. Sci. 55(1): 5-24 (2001)- 2000
[c1]Rafael Accorsi, Carlos Areces, Wiet Bouma, Maarten de Rijke: Features as Constraints. FIW 2000: 210-225
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:08 CEST by the dblp team



