Business Process Privacy Analysis in Pleak

(Extended Abstract)

  • 23 Accesses

This is a preview of subscription content, log in to check access.

Access options

Buy single article

Instant unlimited access to the full article PDF.

US$ 39.95

Price includes VAT for USA

Subscribe to journal

Immediate online access to all issues from 2019. Subscription will auto renew annually.

US$ 99

This is the net price. Taxes to be calculated in checkout.


  1. 1.

    Accorsi R, Lehmann A, Lohmann N (2015) Information Leak Detection in Business Process Models: Theory, application, and tool support. Inf Syst 47: 244–257

  2. 2.

    Governatori G, Milosevic Z, Sadiq S (2006) Compliance checking between business processes and business contracts. In: Proceedings of the 10th International IEEE Enterprise Distributed Object Computing Conference EDOC’06, pp 221–232

  3. 3.

    Van Looy A, Shafagatova A (2016) Business process performance measurement: A structured literature review of indicators, measures and metrics. SpringerPlus 5(1):1797

  4. 4.

    Pullonen P, Tom J, Matulevičius R, Toots A (2019) Privacy-enhanced BPMN: Enabling data privacy analysis in business processes models. Softw Syst Model.

  5. 5.

    Toots A, Tuuling R, Yerokhin M, Dumas M, García-Bañuelos L, Laud P, Matuleviičius R, Pankova A, Pettai M, Pullonen P, Tom J (2019) Business Process Privacy Analysis in Pleak. CoRR abs/1902.05052 (2019).

Download references

Author information

Correspondence to Aivo Toots.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Toots, A., Tuuling, R., Yerokhin, M. et al. Business Process Privacy Analysis in Pleak. Informatik Spektrum 42, 354–355 (2019) doi:10.1007/s00287-019-01204-y

Download citation