Business Process Privacy Analysis in Pleak

(Extended Abstract)

This is a preview of subscription content, access via your institution.


  1. 1.

    Accorsi R, Lehmann A, Lohmann N (2015) Information Leak Detection in Business Process Models: Theory, application, and tool support. Inf Syst 47: 244–257

    Article  Google Scholar 

  2. 2.

    Governatori G, Milosevic Z, Sadiq S (2006) Compliance checking between business processes and business contracts. In: Proceedings of the 10th International IEEE Enterprise Distributed Object Computing Conference EDOC’06, pp 221–232

  3. 3.

    Van Looy A, Shafagatova A (2016) Business process performance measurement: A structured literature review of indicators, measures and metrics. SpringerPlus 5(1):1797

    Article  Google Scholar 

  4. 4.

    Pullonen P, Tom J, Matulevičius R, Toots A (2019) Privacy-enhanced BPMN: Enabling data privacy analysis in business processes models. Softw Syst Model.

    Article  Google Scholar 

  5. 5.

    Toots A, Tuuling R, Yerokhin M, Dumas M, García-Bañuelos L, Laud P, Matuleviičius R, Pankova A, Pettai M, Pullonen P, Tom J (2019) Business Process Privacy Analysis in Pleak. CoRR abs/1902.05052 (2019).

Download references

Author information



Corresponding author

Correspondence to Aivo Toots.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Toots, A., Tuuling, R., Yerokhin, M. et al. Business Process Privacy Analysis in Pleak. Informatik Spektrum 42, 354–355 (2019).

Download citation