Business Process Privacy Analysis in Pleak (Extended Abstract)
dc.contributor.author | Toots, Aivo | |
dc.contributor.author | Tuuling, Reedik | |
dc.contributor.author | Yerokhin, Maksym | |
dc.contributor.author | Dumas, Marlon | |
dc.contributor.author | García-Bañuelos, Luciano | |
dc.contributor.author | Laud, Peeter | |
dc.contributor.author | Matulevičius, Raimundas | |
dc.contributor.author | Pankova, Alisa | |
dc.contributor.author | Pettai, Martin | |
dc.contributor.author | Pullonen, Pille | |
dc.contributor.author | Tom, Jake | |
dc.date.accessioned | 2019-11-20T12:38:36Z | |
dc.date.available | 2019-11-20T12:38:36Z | |
dc.date.issued | 2019 | |
dc.identifier.doi | 10.1007/s00287-019-01204-y | |
dc.identifier.pissn | 0170-6012 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/30200 | |
dc.language.iso | en | |
dc.publisher | Springer Verlag | |
dc.relation.ispartof | Informatik Spektrum: Vol. 42, No. 5 | |
dc.title | Business Process Privacy Analysis in Pleak (Extended Abstract) | en |
dc.type | Text/Journal Article | |
gi.citation.endPage | 355 | |
gi.citation.publisherPlace | Berlin Heidelberg | |
gi.citation.startPage | 354 | |
gi.conference.sessiontitle | Hauptbeitrag |