Uni-Logo
Sie sind hier: Startseite Research Publications
Artikelaktionen

Publications

Filtered by author: Stocker T (clear filter)



Journal Articles

Years: 2015 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994
Icon: top back to the top of all publications

    2013

    Icon: top back to the year overview

    Conference papers

    Years: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1992 | 1991 | 1986
    Icon: top back to the top of all publications

      2014

      Icon: top back to the year overview

      2013

      Icon: top back to the year overview
      • Stocker T, Böhr F
        IF-Net: A Meta-Model for Security-Oriented Process Specification
        2013 9th International Workshop, STM 2013, Egham, UK Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, volume: 8203, pages: 191 - 206
      • Accorsi R, Stocker T, Mueller G
        On the Exploitation of Process Mining for Security Audits: The Process Discovery Case
        2013 Proceedings of the 28th Annual ACM Symposium on Applied Computing, pages: 1462 - 1468
      • Accorsi R, Stocker T
        SecSy: Synthesizing Smart Process Event Logs
        2013 Enterprise Modelling and Information Systems Architectures: Proceedings of the 5th International Workshop on Enterprise Modelling and Information Systems Architectures, EMISA 2013, St. Gallen, Switzerland, September 5-6, 2013, volume: 222, pages: 71 - 84

      2012

      Icon: top back to the year overview
      • Stocker T
        Data Flow-oriented Process Mining to Support Security Audits
        2012 Service-Oriented Computing - ICSOC 2011 Workshops ICSOC Workshops, volume: 7221, pages: 171 - 176
      • Accorsi R, Stocker T
        Discovering Workflow Changes with Time-based Trace Clustering
        2012 Post-proceedings of the IFIP Symposium on Data-Driven Process Discovery and Analysis, pages: 154 - 168
      • Accorsi R, Stocker T
        On the Exploitation of Process Mining for Security Audits: The Conformance Checking Case
        2012 ACM Symposium on Applied Computing, SAC 2012, Riva, Trento, Italy Proceedings of the 27th Annual ACM Symposium on Applied Computing, pages: 1709 - 1716

      2011

      Icon: top back to the year overview
      • Stocker T
        Time-based Trace Clustering for Evolution-aware Security Audits
        2011 BPM 2011 International Workshops, Clermont-Ferrand, France Business Process Management Workshops (2), volume: 100, pages: 471 - 476
      • Accorsi R, Wonnemann C, Stocker T
        Towards forensic data flow analysis of business process logs
        2011 Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany Proceedings of the 6th International Conference on IT Security Incident Management & IT Forensics, pages: 3 - 20
      • Accorsi R, Stocker T
        Towards security-aware process mining
        2011 IFIP Symposium on Data-Driven Process Discovery and Analysis

      2009

      Icon: top back to the year overview
      • Accorsi R, Stocker T
        On Frameworks for the Visualization of Privacy Policies Implications
        2009 W3C Workshop on Access Control Application Scenarios, Luxemburg W3C Workshop on Access Control Application Scenarios

      2008

      Icon: top back to the year overview
      • Accorsi R, Stocker T
        Automated Privacy Audits Based on Pruning of Log Data.
        2008 12th International IEEE Enterprise Distributed Object Computing Conference, ECOC 2008, München Proceedings of the 12th Enterprise Distributed Object Computing Conference Workshops, pages: 175 - 182
      Benutzerspezifische Werkzeuge