Publikationen
Filter löschen)
: Accorsi R (Originalarbeiten in wissenschaftlichen Fachzeitschriften
Jahre: 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994zurück zur Übersicht aller Publikationen
2015
nach oben zur Jahresübersicht- Accorsi R, Lehmann A, Lohmann N
Information leak detection in business process models: Theory, application, and tool support
2015 Inf. Syst., Band: 47, Seiten: 244 - 257
2013
nach oben zur Jahresübersicht- Accorsi R
A secure log architecture to support remote auditing
2013 Mathematical and Computer Modelling 57(7-8), Seiten: 1578 - 1591 - Stocker T, Accorsi R, Rother T
Computergestützte Prozessauditierung mit Process Mining
2013 HMD - Praxis Wirtschaftsinform., Band: 292 - Accorsi R, Matulevicius R
Second Workshop on Security in Business Processes - A workshop report
2013 Enterprise Modelling and Information Systems Architectures 8(2), Seiten: 105 - 107 - Accorsi R
Security in Business Process Management
2013 it - Information Technology 55(6), Seiten: 215 - 216 - Accorsi R, Damiani E, van der Aalst W
Unleashing Operational Process Mining (Dagstuhl Seminar 13481)
2013 Dagstuhl Reports, Band: 3, Nummer: 11, Seiten: 154 - 192 - Accorsi R, Crampton J, Huth M, Rinderle-Ma S
Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341)
2013 Dagstuhl Reports, Band: 3, Nummer: 8, Seiten: 73 - 86 - Accorsi R, Matulevicius R
Workshop on Security in Business Processes - A workshop report
2013 Enterprise Modelling and Information Systems Architectures 8(1), Seiten: 75 - 79
2012
nach oben zur Jahresübersicht- Accorsi R, Ullrich M, van der Aalst W
Process Mining
2012 Informatik Spektrum 35(5), Seiten: 354 - 359
2011
nach oben zur Jahresübersicht- Accorsi R, Lowis L, Sato Y
Automated Certification for Compliant Cloud-based Business Processes
2011 Business & Information Systems Engineering, Band: 3, Seiten: 145 - 154 - Accorsi R, Lowis L, Sato Y
Automatisierte Compliance-Zertifizierung Cloud-basierter Geschäftsprozesse
2011 Wirtschaftsinformatik, Band: 53, Nummer: 3, Seiten: 139 - 149 - Lowis L, Accorsi R
Vulnerability Analysis in SOA-Based Business Processes
2011 IEEE Trans. Services Computing 4(3), Seiten: 230 - 242
2010
nach oben zur Jahresübersicht- Accorsi R, Lowis L
ComCert: Automated Certification of Cloud-based Business Processes
2010 ERCIM News, Band: 83, Seite: 50 - Müller G, Accorsi R, Höhn S, Sackmann S
Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten
2010 Informatik Spektrum, Band: 33, Nummer: 1, Seiten: 3 - 13 - Lowis L, Accorsi R
Vulnerability analysis in SOA-based business processes
2010 IEEE Transactions on Services Computing
2008
nach oben zur Jahresübersicht- Accorsi R, Yoshinori S, Satoshi K
Compliance Monitor for Early Warning Risk Determination.
2008 Wirtschaftsinformatik
2006
nach oben zur Jahresübersicht- Sackmann S, Strüker J, Accorsi R
Personalization in Privacy-Aware Highly Dynamic Systems
2006 Communications of the ACM, Band: 49, Nummer: 9, Seiten: 32 - 38
Monographien
Jahre: 2010 | 2009 | 2008 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 1996zurück zur Übersicht aller Publikationen
2008
nach oben zur Jahresübersicht- Nova Editors
Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security
Schmidt A, Kreutzer M, Accorsi R
Buchbeiträge
Jahre: 2016 | 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1987zurück zur Übersicht aller Publikationen
2013
nach oben zur Jahresübersicht- Müller G, Koslowski T, Accorsi R
Resilience - A New Research Field in Business Information Systems?
In: Business Information Systems Workshops, Seiten: 3 - 21, W. Abramowicz (Hrsg.), Springer (New York), 2013
2011
nach oben zur Jahresübersicht- Accorsi R
BBox: A Distributed Secure Log Architecture
In: Proceedings of the European Workshop on PKI, Springer (Athens, Greece), 2011 - Accorsi R, Wonnemann C
Forensic Leak Detection for Business Processes Models
In: Proceedings of the IFIP Conference on Digital Forensics, Springer-Verlag (Berlin), 2011 - Accorsi R, Wonnemann C
InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements
In: Proceedings of the ERCIM Workshop on Security and Trust Management, Springer (Athens, Greece), 2011
2010
nach oben zur Jahresübersicht- Höhn S, Jürjens J, Lowis L, Accorsi R
Identification of Vulnerabilities in Web Services using Model-Based Securit
In: Web Services Security Development and Architecture: Theoretical and Practical Issues, Seiten: 1 - 32, Gutiérrez, C. and E. Fernández-Medina and M. Piattini (Hrsg.), IGI Global, 2010 - Accorsi R, Wonnemann C
Static Information Flow Analysis of Workflow Models
In: Business Process and Service Science, Seiten: 194 - 205, Gesellschaft für Informatik (Leipzig, Germany), 2010
2009
nach oben zur Jahresübersicht- Accorsi R, Wonnemann C
Detective Information Flow Analysis for Business Processes (Extended Abstract)
In: Business Processes, Services Computing and Intelligent Service Management, Seiten: 223 - 224, Abramowicz, W., Macaszek L., Kowalczyk R., and Speck A. (Hrsg.), Bonner Köllen Verlag (Bonn et al.), 2009
2007
nach oben zur Jahresübersicht- Accorsi R, Höhn S, Maier M
An Approach for Secure Usability for Ambient Intelligence Environments.
In: Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security., A. Schmidt, M. Kreutzer, R. Accorsi (Hrsg.), Nova-Publishers, 2007 - Müller G, Accorsi R, Höhn S, Kähmer M, Strasser M
Sicherheit in Ubiquitous Computing: Schutz durch Gebote?
In: Die Informatisierung des Alltags - Leben in smarten Umgebungen, Seiten: 127 - 142, Friedeman Mattern (Hrsg.), Springer-Verlag, 2007
2006
nach oben zur Jahresübersicht- Accorsi R, Adolf C
Delegating Secure Logging in Pervasive Computing Systems
In: International Conference on Security in Pervasive Computing. Vol 3934. Lecture Notes in Computer Science, Seiten: 58 - 72, John A. Clarke, Richard F. Paige, Fiona A. C. Polack and Phillip J. Brooke (Hrsg.), Springer-Verlag, 2006 - Accorsi R
On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems
In: IFIP International Federation for Information Processing. Vol 201. Security and Privacy in Dynamic Environments, Seiten: 323 - 338, S. Fischer-Hübner, K. Rannenberg, L. Yngström, S. Lindskog (Hrsg.), Springer-Verlag, 2006
Konferenzbeiträge
Jahre: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1992 | 1991 | 1986zurück zur Übersicht aller Publikationen
2015
nach oben zur Jahresübersicht- Accorsi R
A Posteriori Process Security Control
2015 ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015. SciTePress 2015, ISBN 978-989-758-08 - Ceravolo P, Russo B, Accorsi R
Data-Driven Process Discovery and Analysis - 4th International Symposium, SIMPDA 2014, Milan, Italy, November 19-21, 2014, Revised Selected Papers.
2015 Lecture Notes in Business Information Processing 237, Springer 2015, ISBN 978-3-319-27242-9 - Ceravolo P, Accorsi R, Cudré-Mauroux P
Data-Driven Process Discovery and Analysis - Third IFIP WG 2.6, 2.12 International Symposium, SIMPDA 2013, Riva del Garda, Italy, August 30, 2013, Revised Selected Papers.
2015 Lecture Notes in Business Information Processing 203, Springer 2015, ISBN 978-3-662-46435-9 - Brenig C, Accorsi R, Müller G
Economic Analysis of Cryptocurrency Backed Money Laundering
2015 23th European Conference on Information Systems, Münster, Germany forthcoming - Holderer J, Accorsi R, Müller G
When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience
2015 Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015, Seiten: 1245 - 1248
2014
nach oben zur Jahresübersicht- Zimmermann C, Accorsi R, Müller G
Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy
2014 Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security (ARES) , Seiten: 152 - 157
- Accorsi R, Ceravolo P, Russo B
Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), Milan, Italy, November 19-21, 2014
2014 CEUR-WS.orgCEUR Workshop Proceedings, Band: 1293 - Stocker T, Accorsi R
SecSy: A Security-oriented Tool for Synthesizing Process Event Logs
2014 Proceedings of the BPM Demo Sessions 2014 Co-located with the 12th International Conference on Business Process Management (BPM 2014), Eindhoven, The Netherlands, September 10, 2014., Band: 1295 - Accorsi R, Holderer J, Stocker T, Zahoransky R
Security Workflow Analysis Toolkit
2014 Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich, Band: 228, Seiten: 433 - 442 - Zahoransky R, Koslowski T, Accorsi R, ,
Toward Resilience Assessment in Business Process Architectures
2014 Computer Safety, Reliability, and Security - SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings, Band: 8696, Seiten: 360 - 370
2013
nach oben zur Jahresübersicht- Fenz S, Neubauer T, Accorsi R, Koslowski T
FORISK: Formalizing Information Security Risk and Compliance Management
2013 43rd annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), Budapest, 24-27 June 2013 - Accorsi R
On Process Rewriting for Business Process Security
2013 Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, Riva del Garda, Italy, August 30, 2013, Band: 1027, Seiten: 111 - 126 - Accorsi R, Stocker T, Mueller G
On the Exploitation of Process Mining for Security Audits: The Process Discovery Case
2013 Proceedings of the 28th Annual ACM Symposium on Applied Computing, Seiten: 1462 - 1468
- Accorsi R, Müller G
Preventive Inference Control in Data-centric Business Models
2013 2013 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 23-24, 2013, Seiten: 28 - 33 - Accorsi R, Ceravolo P, Cudré-Mauroux P
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, Riva del Garda, Italy, August 30, 2013
2013 CEUR-WS.orgCEUR Workshop Proceedings, Band: 1027 - Accorsi R, Ceravolo P, Cudré-Mauroux P
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, Riva del Garda, Italy, August 30, 2013
2013 CEUR Workshop Proceedings 1027, CEUR-WS.org 2013 - Accorsi R, Stocker T
SecSy: Synthesizing Smart Process Event Logs
2013 Enterprise Modelling and Information Systems Architectures: Proceedings of the 5th International Workshop on Enterprise Modelling and Information Systems Architectures, EMISA 2013, St. Gallen, Switzerland, September 5-6, 2013, Band: 222, Seiten: 71 - 84 - Accorsi R, Ranise S
Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings
2013 SpringerLecture Notes in Computer Science, Band: 8203 - Zimmermann C, Accorsi R
Transparenz durch Privacy Dashboards: Ein Process Mining Ansatz
2013 Koblenz Lecture Notes in Informatics (LNI) - Proceedings Series of the Gesellschaft für Informatik (GI), Band: P-220, Seiten: 2087 - 2101 - Müller G, Accorsi R
Why Are Business Processes Not Secure?
2013 Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, Band: 8260, Seiten: 240 - 254
2012
nach oben zur Jahresübersicht- Accorsi R, Lehmann A
Automatic Information Flow Analysis of Business Process Models
2012 Business Process Management - 10th International Conference, BPM 2012, Tallinn, Estonia, September 3-6, 2012. Proceedings. - Accorsi R, Stocker T
Discovering Workflow Changes with Time-based Trace Clustering
2012 Post-proceedings of the IFIP Symposium on Data-Driven Process Discovery and Analysis, Seiten: 154 - 168
- Accorsi R, Zimmermann C, Müller G
On Taming the Inference Threat in Social Networks
2012 The 1st International Workshop on Privacy and Data Protection Technology (PDPT). Amsterdam Proceedings of the 1st International Workshop on Privacy and Data Protection Technology (PDPT) - Accorsi R, Stocker T
On the Exploitation of Process Mining for Security Audits: The Conformance Checking Case
2012 ACM Symposium on Applied Computing, SAC 2012, Riva, Trento, Italy Proceedings of the 27th Annual ACM Symposium on Applied Computing, Seiten: 1709 - 1716
2011
nach oben zur Jahresübersicht- Accorsi R
Business Process as a Service: Chances for Remote Auditing
2011 Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, COMPSAC Workshops 2011, Munich, Germany, 18-22 July 2011, Seiten: 398 - 403 - Accorsi R, Stocker H
Discovering Workflow Changes with Time-Based Trace Clustering
2011 Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers, Seiten: 154 - 168 - Accorsi R, Wonnemann C
Informationsfluss-Mechanismen zur Zertifizierung von Cloud-basierten Geschäftsprozessen
2011 Deutscher IT-Sicherheitskongress des BSI - Accorsi R
Reliably secure business process specifications
2011 Grande Region Security and Reliability Day, Trier, Germany Proceedings of the Grande Region Security and Reliability Day - Accorsi R, Wonnemann C, Dochow S
SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems
2011 Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, Seiten: 692 - 697 - Accorsi R, Wonnemann C
Strong Non-Leak Guarantees for Workflow Models
2011 ACM Symposium on Applied Computing (Enterprise Engineering Track). TaiChung, Taiwan Proceedings of ACM Symposium on Applied Computing (Enterprise Engineering Track) - Accorsi R, Wonnemann C, Stocker T
Towards forensic data flow analysis of business process logs
2011 Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics, Seiten: 3 - 20
- Accorsi R, Stocker T
Towards security-aware process mining
2011 IFIP Symposium on Data-Driven Process Discovery and Analysis
2010
nach oben zur Jahresübersicht- Accorsi R, Wonnemann C
Auditing Workflow Executions against Dataflow Policies
2010 Conference on Business Information Systems, Berlin, Germany Proceedings of the Conference on Business Information Systems, Lecture Notes in Business Information Processing, Band: 47, Seiten: 207 - 217
2009
nach oben zur Jahresübersicht- Accorsi R
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
2009 1st IEEE Workshop on Computer Forensics in Software Engineering, Seattle, Washington, USA Proceedings of the 1st IEEE Workshop on Computer Forensics in Software Engineering - Accorsi R, Stocker T
On Frameworks for the Visualization of Privacy Policies Implications
2009 W3C Workshop on Access Control Application Scenarios, Luxemburg W3C Workshop on Access Control Application Scenarios
- Wonnemann C, Accorsi R
On Information Flow Forensics in Business Application Scenarios
2009 4th IEEE Workshop on Security, Trust, and Privacy for Software Applications, Seattle, Washington, USA Proceedings of the 4th IEEE Workshop on Security, Trust, and Privacy for Software Applications - Wonnemann C, Accorsi R, Müller G
On Information Flow Forensics in Business Application Scenarios
2009 Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, Seiten: 324 - 328 - Lowis L, Accorsi R
On a Classification Approach for SOA Vulnerabilities
2009 1st IEEE Workshop on Security Aspects of Process and Services Engineering, Seattle, Washington, USA Proceedings of the 1st IEEE Workshop on Security Aspects of Process and Services Engineering - Accorsi R
Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
2009 5th Conference on IT Security Incident Management & IT Forensics, Stuttgart, Germany Proceedings of the 5th Conference on IT Security Incident Management & IT Forensics
2008
nach oben zur Jahresübersicht- Accorsi R, Stocker T
Automated Privacy Audits Based on Pruning of Log Data.
2008 12th International IEEE Enterprise Distributed Object Computing Conference, ECOC 2008, München Proceedings of the 12th Enterprise Distributed Object Computing Conference Workshops, Seiten: 175 - 182
- Accorsi R
Automated Privacy Audits to Complement the Notion of Control for Identity Management.
2008 IFIP. Policies and Research in Identity Management, Band: 261, Seiten: 39 - 48 - Strüker J, Accorsi R, Müller G
On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail.
2008 IEEE Joint Conference on E-Commerce Technology Proceedings of the IEEE Joint Conference on E-Commerce Technology, Seiten: 44 - 49
2007
nach oben zur Jahresübersicht- Accorsi R
Automated Privacy Audits to Complement the Notion of Control for Identity Management
2007 Policies and Research in Identity Management - First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, Octo, Seiten: 39 - 48 - Kähmer M, Accorsi R
Kundenkarten in hochdynamischen Systemen - Von einer Gefährdung zum Schutz der Privatsphäre
2007 Proceedings of the Conference on Communication in Distributed Systems, Workshop on Network Configuration and Security, Seiten: 21 - 26 - Accorsi R, Bernauer M
On Privacy Evidence for UbiComp Environments -- Broadening the Notion of Control to Improve User Acceptance.
2007 5th Workshop on Privacy in UbiComp Proceedings of the 5th Workshop on Privacy in UbiComp - Accorsi R
Privacy Evidence to Complement the Notion of Control for Identity Management
2007 IFIP Conference on Policies and Research in Identity Management Proceedings of the IFIP Conference on Policies and Research in Identity Management
2005
nach oben zur Jahresübersicht- Accorsi R, Kähmer M, Müller G
Security in UbiComp: Protection through Commandments
2005 Seventh Conference on Ubiquitous Computing The Poster Session at the Seventh Conference on Ubiquitous Computing - Accorsi R
Towards a Secure Logging Mechanism for Dynamic Systems
2005 7th IT Security Symposium. São José dos Campos, Brazil Proceedings to the 7th IT Security Symposium
Sonstige Publikationen
Jahre: 2012 | 2010 | 2008 | 2007 | 2006 | 2005 | 2001 | 2000 | 1998zurück zur Übersicht aller Publikationen
2012
nach oben zur Jahresübersicht- Accorsi R, Ruan K
Challenges of Cloud Forensics: A Survey of the Missing Capabilities
ERCIM News 2012(90), 2012
2010
nach oben zur Jahresübersicht- Accorsi R, Müller G
FORTES: Forensic Information Flow Analysis of Business Processes
Distributed Usage Control 2010, 2010