Report date: Apr 30, 2024 Conflict count: 350192 Publisher: Oldenbourg Wissenschaftsverlag Title count: 20 Conflict count: 400 ========================================================== Created: 2014-01-25 15:15:03.0 ConfID: 4513795 CauseID: 1363847928 JT: it - Information Technology MD: null, 3 ,1-6,null,1961,Buchbesprechungen DOI: 10.1524/itit.1961.3.16.266(Journal) (4513795-N ) DOI: 10.1524/itit.1961.3.16.86(Journal) ========================================================== Created: 2014-01-25 15:15:08.0 ConfID: 4536079 CauseID: 1363847929 OtherID: 1363847929 JT: it - Information Technology MD: null, 8 ,1-6,null,1966,Buchbesprechungen DOI: 10.1524/itit.1966.8.16.312(Journal) (4536079-N ) DOI: 10.1524/itit.1966.8.16.48(Journal) ========================================================== Created: 2014-01-23 09:43:24.0 ConfID: 4536931 CauseID: 1363813085 OtherID: 1363865140, 1363865141 JT: it - Information Technology MD: null, 9 ,1-6,null,1967,Buchbesprechungen DOI: 10.1524/itit.1967.9.16.239(Journal) (4536931-N ) DOI: 10.1524/itit.1967.9.16.46(Journal) ========================================================== Created: 2014-01-25 15:15:13.0 ConfID: 4595717 CauseID: 1363847930 JT: it - Information Technology MD: Zemanek, 16 ,1-6,null,1974,Editorial DOI: 10.1524/itit.1974.16.16.43(Journal) (4595717-N ) DOI: 10.1524/itit.1974.16.16.7(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082269 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Matulevičius, 55 ,6,225,2013,Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns DOI: 10.1524/itit.2013.2002(Journal) (6082269-N ) DOI: 10.1515/itit.2013.2002(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082270 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Böhr, 55 ,6,217,2013,Business Process Security Analysis – Design Time, Run Time, Audit Time DOI: 10.1524/itit.2013.2001(Journal) (6082270-N ) DOI: 10.1515/itit.2013.2001(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082271 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Accorsi, 55 ,6,215,2013,Security in Business Process Management DOI: 10.1524/itit.2013.9006(Journal) (6082271-N ) DOI: 10.1515/itit.2013.9006(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082272 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Governatori, 55 ,6,231,2013,Business Process Compliance: An Abstract Normative Framework DOI: 10.1524/itit.2013.2003(Journal) (6082272-N ) DOI: 10.1515/itit.2013.2003(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082273 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Brucker, 55 ,6,239,2013,Integrating Security Aspects into Business Process Models DOI: 10.1524/itit.2013.2004(Journal) (6082273-N ) DOI: 10.1515/itit.2013.2004(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082274 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Strembeck, 55 ,6,247,2013,Security and Privacy in Business Processes: A Posteriori Analysis Techniques DOI: 10.1524/itit.2013.2005(Journal) (6082274-N ) DOI: 10.1515/itit.2013.2005(Journal) ========================================================== Created: 2021-06-22 11:43:02.0 ConfID: 6082275 CauseID: 1501536196 OtherID: 1499482968 JT: it - Information Technology MD: Adriansyah, 55 ,6,255,2013,Privacy Analysis of User Behavior Using Alignments DOI: 10.1524/itit.2013.2006(Journal) (6082275-N ) DOI: 10.1515/itit.2013.2006(Journal)