메뉴 건너뛰기




Volumn 12, Issue 4, 2003, Pages 455-485

W-RBAC - A workflow security model incorporating controlled overriding of constraints

Author keywords

Access control; Constraints; RBAC; Workflow management

Indexed keywords

AUTOMATION; COMPUTER PROGRAMMING LANGUAGES; INFORMATION ANALYSIS; OPTIMIZATION;

EID: 0348209180     PISSN: 02188430     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218843003000814     Document Type: Article
Times cited : (149)

References (21)
  • 1
    • 85031151129 scopus 로고    scopus 로고
    • The RSL99 language for role-based separation of duty constraints
    • G.-J. Ahn and R. Sandhu, The RSL99 language for role-based separation of duty constraints, ACM RBAC Workshop 99, 43-54, 1999.
    • (1999) ACM RBAC Workshop , vol.99 , pp. 43-54
    • Ahn, G.-J.1    Sandhu, R.2
  • 3
    • 0031382313 scopus 로고    scopus 로고
    • A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems
    • E. Bertino, E. Ferrari and V. Atluri, A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems, Proc. of the Second ACM Workshop on Role-Based Access Control, 1997, 1-12.
    • (1997) Proc. of the Second ACM Workshop on Role-based Access Control , pp. 1-12
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari and V. Atluri, The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (1999) 65-104.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 6
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • S. Castano, F. Casati and M. Fugini, Managing workflow authorization constraints through active database technology, Information Systems Frontiers 3, 3, 2001.
    • (2001) Information Systems Frontiers , vol.3 , Issue.3
    • Castano, S.1    Casati, F.2    Fugini, M.3
  • 15
    • 0033651730 scopus 로고    scopus 로고
    • Modeling users in role-based access control
    • S. Osborn and Y. Guo, Modeling users in role-based access control, ACM RBAC 2000, 2000, 31-37.
    • (2000) ACM RBAC 2000 , pp. 31-37
    • Osborn, S.1    Guo, Y.2
  • 16
    • 0346203698 scopus 로고    scopus 로고
    • The wide project: Final report
    • Wide Consortium
    • G. Sanchez, The wide project: Final report, Technical Report, Wide Consortium, 1999.
    • (1999) Technical Report
    • Sanchez, G.1
  • 21
    • 25944449705 scopus 로고    scopus 로고
    • Security management in the presence of delegation and revocation in workflow systems
    • Instituto de Computação, UNICAMP
    • J. Wainer, A. Kumar and P. Barthelmess, Security management in the presence of delegation and revocation in workflow systems, Technical Report IC-01-14, Instituto de Computação, UNICAMP, 2001, http://www.ic.unicamp.br/ic-tr-ftp/2001/Titles.html.
    • (2001) Technical Report , vol.IC-01-14
    • Wainer, J.1    Kumar, A.2    Barthelmess, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.