Vol-2621⫷ Vol-2622 ⫸Vol-2623
urn:nbn:de:0074-2622-0


Vol-2622/paper5⫷Vol-2622/paper6⫸Vol-2622/paper7

Extracting Attribute-Based Access Control Rules from Business Process Event Logs