Rafael Accorsi

Orcid: 0000-0001-5620-561X

Affiliations:
  • University of Freiburg, Germany


According to our database1, Rafael Accorsi authored at least 65 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AI-augmented Business Process Management Systems: A Research Manifesto.
ACM Trans. Manag. Inf. Syst., March, 2023

2022
Augmented Business Process Management Systems: A Research Manifesto.
CoRR, 2022

A Practitioner's View on Process Mining Adoption, Event Log Engineering and Data Challenges.
Proceedings of the Process Mining Handbook, 2022

2021
Rethinking the Input for Process Mining: Insights from the XES Survey and Workshop.
Proceedings of the Process Mining Workshops - ICPM 2021 International Workshops, Eindhoven, The Netherlands, October 31, 2021

Has the Pandemic Impacted my Workforce's Productivity? Applying Effort Mining to Identify Productivity Shifts during COVID-19 Lockdown.
Proceedings of the Industry Forum at BPM 2021 co-located with 19th International Conference on Business Process Management (BPM 2021), 2021

2015
Information leak detection in business process models: Theory, application, and tool support.
Inf. Syst., 2015

When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

A Posteriori Process Security Control.
Proceedings of the ICISSP 2015, 2015

Economic Analysis of Cryptocurrency Backed Money Laundering.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
Security Workflow Analysis Toolkit.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Toward Resilience Assessment in Business Process Architectures.
Proceedings of the Computer Safety, Reliability, and Security, 2014

SecSy: A Security-oriented Tool for Synthesizing Process Event Logs.
Proceedings of the BPM Demo Sessions 2014 Co-located with the 12th International Conference on Business Process Management (BPM 2014), 2014

Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A secure log architecture to support remote auditing.
Math. Comput. Model., 2013

Security in Business Process Management.
it Inf. Technol., 2013

Computergestützte Prozessauditierung mit Process Mining.
HMD Prax. Wirtsch., 2013

Second Workshop on Security in Business Processes - A workshop report.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2013

Workshop on Security in Business Processes - A workshop report.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2013

Unleashing Operational Process Mining (Dagstuhl Seminar 13481).
Dagstuhl Reports, 2013

Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341).
Dagstuhl Reports, 2013

Preventive Inference Control in Data-centric Business Models.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

On Process Rewriting for Business Process Security.
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, 2013

On the exploitation of process mining for security audits: the process discovery case.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Transparenz durch Privacy Dashboards: Ein Process Mining Ansatz.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

SecSy: Synthesizing Smart Process Event Logs.
Proceedings of the Enterprise Modelling and Information Systems Architectures: Proceedings of the 5th International Workshop on Enterprise Modelling and Information Systems Architectures, 2013

FORISK: Formalizing information security risk and compliance management.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

Resilience - A New Research Field in Business Information Systems?
Proceedings of the Business Information Systems Workshops, 2013

Why Are Business Processes Not Secure?
Proceedings of the Number Theory and Cryptography, 2013

2012
Process Mining.
Inform. Spektrum, 2012

Challenges of Cloud Forensics: A Survey of the Missing Capabilities.
ERCIM News, 2012

On the exploitation of process mining for security audits: the conformance checking case.
Proceedings of the ACM Symposium on Applied Computing, 2012

Automatic Information Flow Analysis of Business Process Models.
Proceedings of the Business Process Management - 10th International Conference, 2012

2011
Automatisierte Compliance-Zertifizierung Cloud-basierter Geschäftsprozesse.
Wirtschaftsinf., 2011

Vulnerability Analysis in SOA-Based Business Processes.
IEEE Trans. Serv. Comput., 2011

Automated Certification for Compliant Cloud-based Business Processes.
Bus. Inf. Syst. Eng., 2011

Discovering Workflow Changes with Time-Based Trace Clustering.
Proceedings of the Data-Driven Process Discovery and Analysis, 2011

Strong non-leak guarantees for workflow models.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Towards Forensic Data Flow Analysis of Business Process Logs.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011

Forensic Leak Detection for Business Process Models.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Anwenden struktureller Nicht-Interferenz zur Sicherheitsanalyse von Workflow-Modellen.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Business Process as a Service: Chances for Remote Auditing.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten.
Inform. Spektrum, 2010

ComCert: Automated Certification of Cloud-based Business Processes.
ERCIM News, 2010

InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

BBox: A Distributed Secure Log Architecture.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

FORTES: Forensic Information Flow Analysis of Business Processes.
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010

Static Information Flow Analysis of Workflow Models.
Proceedings of the INFORMATIK 2010 - Business Process and Service Science - Proceedings of ISSS and BPSC, September 27, 2010

Auditing Workflow Executions against Dataflow Policies.
Proceedings of the Business Information Systems, 13th International Conference, 2010

2009
Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges.
Proceedings of the IMF 2009, 2009

Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09).
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

On Information Flow Forensics in Business Application Scenarios.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

On a Classification Approach for SOA Vulnerabilities.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Detective Information Flow Analysis for Business Processes.
Proceedings of the Business Process, 2009

2008
Automated counterexample-driven audits of authentic system records.
PhD thesis, 2008

Compliance-Monitor zur Frühwarnung vor Risiken.
Wirtschaftsinf., 2008

On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail.
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

Automated Privacy Audits Based on Pruning of Log Data.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

2007
Automated Privacy Audits to Complement the Notion of Control for Identity Management.
Proceedings of the Policies and Research in Identity Management, 2007

2006
Personalization in privacy-aware highly dynamic systems.
Commun. ACM, 2006

Delegating Secure Logging in Pervasive Computing Systems.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2001
Towards an awareness-based semantics for security protocol analysis.
Proceedings of the Logical Aspects of Cryptographic Protocol Verification, 2001

2000
Features as Constraints.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VI, 2000


  Loading...