Verifying workflow processes against organization security policies | IEEE Conference Publication | IEEE Xplore