“…(Accorsi et al, 2011a), (Accorsi et al, 2011b), (Accorsi et al, 2012), (Fenz et al, 2009), , (Lehmann et al, 2013), and (Lohmann et al, 2009)) and confidentiality determination methods implemented as part of different risk assessment methods (e.g., NIST (Barker et al, 2008a), Magerit (Spanish Ministry for Public Administrations, 2006), and Mehari (CLUSIF, 2010)). When dealing with confidentiality requirements in business processes one of the first decisions to make is the level to which each asset should be protected.…”