-
2
-
-
0002848811
-
Specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E. and Atluri, V. (1999), "Specification and enforcement of authorization constraints in workflow management systems", ACM Transactions on Information and System Security, Vol. 2 No. 1, pp. 65-104.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
3
-
-
0033097622
-
Reinventing GTE with information technology
-
Brandau, R., Confrey, T., D'Silva, A., Matheus, C.J. and Weihmayer, R. (1999), "Reinventing GTE with information technology", IEEE Computer, Vol. 32 No. 3, pp. 50-8.
-
(1999)
IEEE Computer
, vol.32
, Issue.3
, pp. 50-58
-
-
Brandau, R.1
Confrey, T.2
D'Silva, A.3
Matheus, C.J.4
Weihmayer, R.5
-
5
-
-
0032631485
-
Beyond re-engineering: The three phases of business transformation
-
Davidson, W.H. (1993), "Beyond re-engineering: the three phases of business transformation", IBM Systems Journal, Vol. 38 Nos 2 and 3, pp. 485-99.
-
(1993)
IBM Systems Journal
, vol.38
, Issue.2-3
, pp. 485-499
-
-
Davidson, W.H.1
-
6
-
-
71549115820
-
Strategies for business process reengineering: Evidence from field studies
-
Earl, M.J., Sampler, J.L. and Short, J.E. (1995), "Strategies for business process reengineering: evidence from field studies", Journal of Management Information Systems, Vol. 12 No. 1, pp. 31-56.
-
(1995)
Journal of Management Information Systems
, vol.12
, Issue.1
, pp. 31-56
-
-
Earl, M.J.1
Sampler, J.L.2
Short, J.E.3
-
7
-
-
84986156587
-
The scope paradigm of business process re-engineering
-
Evans, G.N., Mason-Jones, R. and Towill, D.R. (1999), "The scope paradigm of business process re-engineering", Business Process Management Journal, Vol. 5 No. 2, pp. 121-35.
-
(1999)
Business Process Management Journal
, vol.5
, Issue.2
, pp. 121-135
-
-
Evans, G.N.1
Mason-Jones, R.2
Towill, D.R.3
-
8
-
-
0011421304
-
IT must focus on transforming business for e-commerce
-
Garber, L. (1999), "IT must focus on transforming business for e-commerce", IT Professional, Vol. 1 No. 6, p. 88.
-
(1999)
IT Professional
, vol.1
, Issue.6
, pp. 88
-
-
Garber, L.1
-
11
-
-
0001841217
-
Business process change: A study of methodologies, techniques, and tools
-
Kettinger, W.J., Teng, J.T.C. and Guha, S. (1997), "Business process change: a study of methodologies, techniques, and tools", MIS Quarterly, Vol. 21 No. 1, pp. 55-80.
-
(1997)
MIS Quarterly
, vol.21
, Issue.1
, pp. 55-80
-
-
Kettinger, W.J.1
Teng, J.T.C.2
Guha, S.3
-
12
-
-
0003682968
-
-
Harcourt Brace Jovanovich Publishers, New York, NY
-
Khandwalla, P.N. (1977), The Design of Organizations, Harcourt Brace Jovanovich Publishers, New York, NY.
-
(1977)
The Design of Organizations
-
-
Khandwalla, P.N.1
-
13
-
-
84949526405
-
A prototype secure workflow server
-
Radisson Resort Scottsdale, Phoenix, AZ
-
Long, D.L., Baker, J. and Fung, F. (1999), "A prototype secure workflow server", Proceedings of the 15th Annual Computer Security Applications Conference, Radisson Resort Scottsdale, Phoenix, AZ, pp. 129-38.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference
, pp. 129-138
-
-
Long, D.L.1
Baker, J.2
Fung, F.3
-
14
-
-
0001940210
-
The role-graph model and conflict of interest
-
Nyanchama, M. and Osborn, S. (1999), "The role-graph model and conflict of interest", ACM Transactions on Information and Systems Security, Vol. 2 No. 1, pp. 3-33.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, Issue.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.2
-
15
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Fenstein, H.L. and Youman, C.E. (1996), "Role-based access control models", IEEE Computer, Vol. 29 No. 2, pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Fenstein, H.L.3
Youman, C.E.4
-
16
-
-
0001897127
-
Information security management: Why standards are important
-
von Solms, R. (1999), "Information security management: why standards are important", Information Management and Computer Security, Vol. 7 No. 1, pp. 50-7.
-
(1999)
Information Management and Computer Security
, vol.7
, Issue.1
, pp. 50-57
-
-
Von Solms, R.1
|