Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases...

2
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Procurement Process -- The Case for Improvisation in Information Security Risk Management -- BPM-in-the-Large...