Modelling and transforming security constraints in privacy-aware business processes | IEEE Conference Publication | IEEE Xplore