Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases...