default search action
Rafael Accorsi
Person information
- affiliation: University of Freiburg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Marlon Dumas, Fabiana Fournier, Lior Limonad, Andrea Marrella, Marco Montali, Jana-Rebecca Rehse, Rafael Accorsi, Diego Calvanese, Giuseppe De Giacomo, Dirk Fahland, Avigdor Gal, Marcello La Rosa, Hagen Völzer, Ingo Weber:
AI-augmented Business Process Management Systems: A Research Manifesto. ACM Trans. Manag. Inf. Syst. 14(1): 11:1-11:19 (2023) - 2022
- [p1]Rafael Accorsi, Julian Lebherz:
A Practitioner's View on Process Mining Adoption, Event Log Engineering and Data Challenges. Process Mining Handbook 2022: 212-240 - [i6]Marlon Dumas, Fabiana Fournier, Lior Limonad, Andrea Marrella, Marco Montali, Jana-Rebecca Rehse, Rafael Accorsi, Diego Calvanese, Giuseppe De Giacomo, Dirk Fahland, Avigdor Gal, Marcello La Rosa, Hagen Völzer, Ingo Weber:
Augmented Business Process Management Systems: A Research Manifesto. CoRR abs/2201.12855 (2022) - 2021
- [c43]Wolf-Dietrich Zabka, Peter Blank, Rafael Accorsi:
Has the Pandemic Impacted my Workforce's Productivity? Applying Effort Mining to Identify Productivity Shifts during COVID-19 Lockdown. BPM Industry Forum 2021: 3-13 - [c42]Moe Thandar Wynn, Julian Lebherz, Wil M. P. van der Aalst, Rafael Accorsi, Claudio Di Ciccio, Lakmali Jayarathna, H. M. W. Verbeek:
Rethinking the Input for Process Mining: Insights from the XES Survey and Workshop. ICPM Workshops 2021: 3-16
2010 – 2019
- 2015
- [j13]Rafael Accorsi, Andreas Lehmann, Niels Lohmann:
Information leak detection in business process models: Theory, application, and tool support. Inf. Syst. 47: 244-257 (2015) - [c41]Christian Brenig, Rafael Accorsi, Günter Müller:
Economic Analysis of Cryptocurrency Backed Money Laundering. ECIS 2015 - [c40]Rafael Accorsi:
A Posteriori Process Security Control. ICISSP 2015: IS-5 - [c39]Julius Holderer, Rafael Accorsi, Günter Müller:
When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience. SAC 2015: 1245-1248 - [e5]Paolo Ceravolo, Rafael Accorsi, Philippe Cudré-Mauroux:
Data-Driven Process Discovery and Analysis - Third IFIP WG 2.6, 2.12 International Symposium, SIMPDA 2013, Riva del Garda, Italy, August 30, 2013, Revised Selected Papers. Lecture Notes in Business Information Processing 203, Springer 2015, ISBN 978-3-662-46435-9 [contents] - [e4]Paolo Ceravolo, Barbara Russo, Rafael Accorsi:
Data-Driven Process Discovery and Analysis - 4th International Symposium, SIMPDA 2014, Milan, Italy, November 19-21, 2014, Revised Selected Papers. Lecture Notes in Business Information Processing 237, Springer 2015, ISBN 978-3-319-27242-9 [contents] - 2014
- [c38]Christian Zimmermann, Rafael Accorsi, Günter Müller:
Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy. ARES 2014: 152-157 - [c37]Thomas Stocker, Rafael Accorsi:
SecSy: A Security-oriented Tool for Synthesizing Process Event Logs. BPM (Demos) 2014: 71 - [c36]Richard M. Zahoransky, Thomas G. Koslowski, Rafael Accorsi:
Toward Resilience Assessment in Business Process Architectures. SAFECOMP Workshops 2014: 360-370 - [c35]Rafael Accorsi, Julius Holderer, Thomas Stocker, Richard M. Zahoransky:
Security Workflow Analysis Toolkit. Sicherheit 2014: 433-442 - [e3]Rafael Accorsi, Paolo Ceravolo, Barbara Russo:
Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), Milan, Italy, November 19-21, 2014. CEUR Workshop Proceedings 1293, CEUR-WS.org 2014 [contents] - 2013
- [j12]Rafael Accorsi, Raimundas Matulevicius:
Workshop on Security in Business Processes - A workshop report. Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. 8(1): 75-79 (2013) - [j11]Rafael Accorsi, Raimundas Matulevicius:
Second Workshop on Security in Business Processes - A workshop report. Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. 8(2): 105-107 (2013) - [j10]Thomas Stocker, Rafael Accorsi, Tobias Rother:
Computergestützte Prozessauditierung mit Process Mining. HMD Prax. Wirtsch. 292: 92-103 (2013) - [j9]Rafael Accorsi:
Security in Business Process Management. it Inf. Technol. 55(6): 215-216 (2013) - [j8]Rafael Accorsi:
A secure log architecture to support remote auditing. Math. Comput. Model. 57(7-8): 1578-1591 (2013) - [c34]Günter Müller, Rafael Accorsi:
Why Are Business Processes Not Secure? Number Theory and Cryptography 2013: 240-254 - [c33]Günter Müller, Thomas G. Koslowski, Rafael Accorsi:
Resilience - A New Research Field in Business Information Systems? BIS (Workshops) 2013: 3-14 - [c32]Stefan Fenz, Thomas Neubauer, Rafael Accorsi, Thomas G. Koslowski:
FORISK: Formalizing information security risk and compliance management. DSN Workshops 2013: 1-4 - [c31]Rafael Accorsi, Thomas Stocker:
SecSy: Synthesizing Smart Process Event Logs. EMISA 2013: 71-84 - [c30]Christian Zimmermann, Rafael Accorsi:
Transparenz durch Privacy Dashboards: Ein Process Mining Ansatz. GI-Jahrestagung 2013: 2087-2101 - [c29]Rafael Accorsi, Thomas Stocker, Günter Müller:
On the exploitation of process mining for security audits: the process discovery case. SAC 2013: 1462-1468 - [c28]Rafael Accorsi:
On Process Rewriting for Business Process Security. SIMPDA 2013: 111-126 - [c27]Rafael Accorsi, Günter Müller:
Preventive Inference Control in Data-centric Business Models. IEEE Symposium on Security and Privacy Workshops 2013: 28-33 - [e2]Rafael Accorsi, Paolo Ceravolo, Philippe Cudré-Mauroux:
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, Riva del Garda, Italy, August 30, 2013. CEUR Workshop Proceedings 1027, CEUR-WS.org 2013 [contents] - [e1]Rafael Accorsi, Silvio Ranise:
Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings. Lecture Notes in Computer Science 8203, Springer 2013, ISBN 978-3-642-41097-0 [contents] - [i5]Rafael Accorsi, Jason Crampton, Michael Huth, Stefanie Rinderle-Ma:
Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341). Dagstuhl Reports 3(8): 73-86 (2013) - [i4]Rafael Accorsi, Ernesto Damiani, Wil M. P. van der Aalst:
Unleashing Operational Process Mining (Dagstuhl Seminar 13481). Dagstuhl Reports 3(11): 154-192 (2013) - 2012
- [j7]Rafael Accorsi, Meike Ullrich, Wil M. P. van der Aalst:
Process Mining. Inform. Spektrum 35(5): 354-359 (2012) - [c26]Rafael Accorsi, Andreas Lehmann:
Automatic Information Flow Analysis of Business Process Models. BPM 2012: 172-187 - [c25]Rafael Accorsi, Thomas Stocker:
On the exploitation of process mining for security audits: the conformance checking case. SAC 2012: 1709-1716 - [i3]Rafael Accorsi, Keyun Ruan:
Challenges of Cloud Forensics: A Survey of the Missing Capabilities. ERCIM News 2012(90) (2012) - 2011
- [j6]Rafael Accorsi, Lutz Lowis, Yoshinori Sato:
Automated Certification for Compliant Cloud-based Business Processes. Bus. Inf. Syst. Eng. 3(3): 145-154 (2011) - [j5]Lutz Lowis, Rafael Accorsi:
Vulnerability Analysis in SOA-Based Business Processes. IEEE Trans. Serv. Comput. 4(3): 230-242 (2011) - [j4]Rafael Accorsi, Lutz Lowis, Yoshinori Sato:
Automatisierte Compliance-Zertifizierung Cloud-basierter Geschäftsprozesse. Wirtschaftsinf. 53(3): 139-149 (2011) - [c24]Rafael Accorsi, Claus Wonnemann, Sebastian Dochow:
SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems. ARES 2011: 692-697 - [c23]Rafael Accorsi:
Business Process as a Service: Chances for Remote Auditing. COMPSAC Workshops 2011: 398-403 - [c22]Rafael Accorsi:
Anwenden struktureller Nicht-Interferenz zur Sicherheitsanalyse von Workflow-Modellen. GI-Jahrestagung 2011: 349 - [c21]Rafael Accorsi, Claus Wonnemann:
Forensic Leak Detection for Business Process Models. IFIP Int. Conf. Digital Forensics 2011: 101-113 - [c20]Rafael Accorsi, Claus Wonnemann, Thomas Stocker:
Towards Forensic Data Flow Analysis of Business Process Logs. IMF 2011: 3-20 - [c19]Rafael Accorsi, Claus Wonnemann:
Strong non-leak guarantees for workflow models. SAC 2011: 308-314 - [c18]Rafael Accorsi, Thomas Stocker:
Discovering Workflow Changes with Time-Based Trace Clustering. SIMPDA 2011: 154-168 - 2010
- [j3]Günter Müller, Rafael Accorsi, Sebastian Höhn, Stefan Sackmann:
Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten. Inform. Spektrum 33(1): 3-13 (2010) - [c17]Rafael Accorsi, Claus Wonnemann:
Auditing Workflow Executions against Dataflow Policies. BIS 2010: 207-217 - [c16]Rafael Accorsi, Claus Wonnemann:
Static Information Flow Analysis of Workflow Models. ISSS/BPSC 2010: 194-205 - [c15]Rafael Accorsi:
BBox: A Distributed Secure Log Architecture. EuroPKI 2010: 109-124 - [c14]Rafael Accorsi, Claus Wonnemann:
InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements. STM 2010: 194-209 - [i2]Rafael Accorsi, Günter Müller:
FORTES: Forensic Information Flow Analysis of Business Processes. Distributed Usage Control 2010 - [i1]Rafael Accorsi, Lutz Lowis:
ComCert: Automated Certification of Cloud-based Business Processes. ERCIM News 2010(83): 50-51 (2010)
2000 – 2009
- 2009
- [c13]Rafael Accorsi, Claus Wonnemann:
Detective Information Flow Analysis for Business Processes. BPSC 2009: 223-224 - [c12]Claus Wonnemann, Rafael Accorsi, Günter Müller:
On Information Flow Forensics in Business Application Scenarios. COMPSAC (2) 2009: 324-328 - [c11]Rafael Accorsi:
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer? COMPSAC (2) 2009: 398-403 - [c10]Lutz Lowis, Rafael Accorsi:
On a Classification Approach for SOA Vulnerabilities. COMPSAC (2) 2009: 439-444 - [c9]Rafael Accorsi, Ernesto Damiani, Frank Innerhofer-Oberperfler, Florian Kerschbaum:
Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09). EDOCW 2009: 166-167 - [c8]Rafael Accorsi:
Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. IMF 2009: 94-110 - 2008
- [b1]Rafael Accorsi:
Automated counterexample-driven audits of authentic system records. University of Freiburg, 2008 - [j2]Rafael Accorsi, Yoshinori Sato, Satoshi Kai:
Compliance-Monitor zur Frühwarnung vor Risiken. Wirtschaftsinf. 50(5): 375-382 (2008) - [c7]Rafael Accorsi, Thomas Stocker:
Automated Privacy Audits Based on Pruning of Log Data. EDOCW 2008: 175-182 - [c6]Jens Strüker, Rafael Accorsi, Günter Müller:
On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail. CEC/EEE 2008: 44-49 - 2007
- [c5]Rafael Accorsi:
Automated Privacy Audits to Complement the Notion of Control for Identity Management. IDMAN 2007: 39-48 - 2006
- [j1]Stefan Sackmann, Jens Strüker, Rafael Accorsi:
Personalization in privacy-aware highly dynamic systems. Commun. ACM 49(9): 32-38 (2006) - [c4]Rafael Accorsi:
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. SEC 2006: 329-339 - [c3]Rafael Accorsi, Adolf Hohl:
Delegating Secure Logging in Pervasive Computing Systems. SPC 2006: 58-72 - 2001
- [c2]Rafael Accorsi, David A. Basin, Luca Viganò:
Towards an awareness-based semantics for security protocol analysis. LACPV@CAV 2001: 5-24 - 2000
- [c1]Rafael Accorsi, Carlos Areces, Wiet Bouma, Maarten de Rijke:
Features as Constraints. FIW 2000: 210-225
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint