References
Accorsi R, Lehmann A, Lohmann N (2015) Information Leak Detection in Business Process Models: Theory, application, and tool support. Inf Syst 47: 244–257
Governatori G, Milosevic Z, Sadiq S (2006) Compliance checking between business processes and business contracts. In: Proceedings of the 10th International IEEE Enterprise Distributed Object Computing Conference EDOC’06, pp 221–232
Van Looy A, Shafagatova A (2016) Business process performance measurement: A structured literature review of indicators, measures and metrics. SpringerPlus 5(1):1797
Pullonen P, Tom J, Matulevičius R, Toots A (2019) Privacy-enhanced BPMN: Enabling data privacy analysis in business processes models. Softw Syst Model. https://doi.org/10.1007/s10270-019-00718-z
Toots A, Tuuling R, Yerokhin M, Dumas M, García-Bañuelos L, Laud P, Matuleviičius R, Pankova A, Pettai M, Pullonen P, Tom J (2019) Business Process Privacy Analysis in Pleak. CoRR abs/1902.05052 (2019). https://arxiv.org/abs/1902.05052
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Toots, A., Tuuling, R., Yerokhin, M. et al. Business Process Privacy Analysis in Pleak. Informatik Spektrum 42, 354–355 (2019). https://doi.org/10.1007/s00287-019-01204-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00287-019-01204-y