Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions | Publicación