Info
Publikationen
Gefiltert nach Autor : Wonnemann C (Filter löschen )
Liste filtern :
Originalarbeiten in wissenschaftlichen Fachzeitschriften
Jahre:
2015 |
2013 |
2012 |
2011 |
2010 |
2009 |
2008 |
2007 |
2006 |
2005 |
2004 |
2003 |
2002 |
2001 |
2000 |
1999 |
1998 |
1997 |
1996 |
1995 |
1994
|
alle anzeigen
zurück zur Übersicht aller Publikationen
nach oben zur Jahresübersicht
nach oben zur Jahresübersicht
Buchbeiträge
Jahre:
2016 |
2015 |
2013 |
2012 |
2011 |
2010 |
2009 |
2008 |
2007 |
2006 |
2005 |
2004 |
2003 |
2002 |
2001 |
2000 |
1999 |
1998 |
1997 |
1996 |
1995 |
1994 |
1987
|
alle anzeigen
zurück zur Übersicht aller Publikationen
nach oben zur Jahresübersicht
Accorsi R , Wonnemann C
Forensic Leak Detection for Business Processes Models
In : Proceedings of the IFIP Conference on Digital Forensics , Springer-Verlag (Berlin), 2011
Accorsi R , Wonnemann C
InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements
In : Proceedings of the ERCIM Workshop on Security and Trust Management , Springer (Athens, Greece), 2011
nach oben zur Jahresübersicht
Accorsi R , Wonnemann C
Static Information Flow Analysis of Workflow Models
In : Business Process and Service Science , Seiten : 194 - 205, Gesellschaft für Informatik (Leipzig, Germany), 2010
nach oben zur Jahresübersicht
Accorsi R , Wonnemann C
Detective Information Flow Analysis for Business Processes (Extended Abstract)
In : Business Processes, Services Computing and Intelligent Service Management , Seiten : 223 - 224, Abramowicz, W., Macaszek L., Kowalczyk R., and Speck A. (Hrsg.) , Bonner Köllen Verlag (Bonn et al.), 2009
Konferenzbeiträge
Jahre:
2017 |
2016 |
2015 |
2014 |
2013 |
2012 |
2011 |
2010 |
2009 |
2008 |
2007 |
2006 |
2005 |
2004 |
2003 |
2002 |
2001 |
2000 |
1999 |
1998 |
1997 |
1996 |
1995 |
1994 |
1992 |
1991 |
1986
|
alle anzeigen
zurück zur Übersicht aller Publikationen
nach oben zur Jahresübersicht
Accorsi R , Wonnemann C
Informationsfluss-Mechanismen zur Zertifizierung von Cloud-basierten Geschäftsprozessen
2011 Deutscher IT-Sicherheitskongress des BSI
Accorsi R , Wonnemann C , Dochow S
SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems
2011 Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, Seiten : 692 - 697
Accorsi R , Wonnemann C
Strong Non-Leak Guarantees for Workflow Models
2011 ACM Symposium on Applied Computing (Enterprise Engineering Track). TaiChung, Taiwan Proceedings of ACM Symposium on Applied Computing (Enterprise Engineering Track)
Accorsi R , Wonnemann C , Stocker T
Towards forensic data flow analysis of business process logs
2011 Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics, Seiten : 3 - 20
» Kurzfassung anzeigen
« Kurzfassung verbergen
Kurzfassung
This paper presents RecIF, a forensic technique for the analysis of business process logs to detect illegal data flows. RecIF uses propagation graphs to formally capture the data flow within a process execution. Abstracting away from the concrete traces, propagation graphs are analyzed with extensional data flow policies that denote what -- instead of how -- relevant industrial requirements, e.g. Chinese Wall and separation of duty constraints, are to be achieved. An example and the corresponding runtime figures demonstrate the feasibility of the approach.
nach oben zur Jahresübersicht
Accorsi R , Wonnemann C
Auditing Workflow Executions against Dataflow Policies
2010 Conference on Business Information Systems, Berlin, Germany Proceedings of the Conference on Business Information Systems, Lecture Notes in Business Information Processing, Band : 47, Seiten : 207 - 217
nach oben zur Jahresübersicht
Wonnemann C , Accorsi R
On Information Flow Forensics in Business Application Scenarios
2009 4th IEEE Workshop on Security, Trust, and Privacy for Software Applications, Seattle, Washington, USA Proceedings of the 4th IEEE Workshop on Security, Trust, and Privacy for Software Applications
Wonnemann C , Accorsi R , Müller G
On Information Flow Forensics in Business Application Scenarios
2009 Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, Seiten : 324 - 328
nach oben zur Jahresübersicht
Wonnemann C , Strüker J
Password Management for EPC Class 1 Generation 2 Transponders
2008 10th IEEE Conference on E-Commerce Technology (CEC'08), Washington, USA Proceedings of the 10th IEEE Conference on E-Commerce Technology (CEC'08)