Enterprise Security.- Computable consent - from regulatory, legislative, and organizational policies to security.- Multi-Level Cyber-Security Reference Model in Support of Vulnerability Analysis.- Security Ontologies: A Systematic Literature Review.- Enterprise Architecture.- Model-based Construction of Enterprise Architecture Knowledge Graphs.- Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider.- Interoperability of digital government services: A Brazilian Reference Architecture Model to promote communication, management, and reuse of solutions.- Business Process Modeling and Monitoring.- Modeling, Executing and Monitoring IoT-Driven Business Rules in BPMN and DMN: Current Support and Challenges.- Enhanced Transformation of BPMN Models with Cancellation Features.- Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability.- Business Process Mining and Discovery.- On the Origin of Questions in Process Mining Projects.- Extracting business process entities and relations from text using pre-trained language models and in-context learning.- Discovering Sound Free-choice Workflow Nets With Non-block Structures.- Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences.- Process-Driven Applications.- Semi-Automated Test Migration for BPMN-based Process-Driven Applications.- Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows.