Frage zu Artikel "ISSE 2010 Securing Electronic Business Processes"