-
1
-
-
0032027597
-
Modeling and Analysis of Workflows Using Petri Nets
-
Special Issue on Workflow and Process Management, March
-
N. R. Adam, V. Atluri, and W.-K. Huang. Modeling and Analysis of Workflows Using Petri Nets. Journal of Intelligent Information Systems, Special Issue on Workflow and Process Management, 10(2):131-158, March 1998.
-
(1998)
Journal of Intelligent Information Systems
, vol.10
, Issue.2
, pp. 131-158
-
-
Adam, N.R.1
Atluri, V.2
Huang, W.-K.3
-
3
-
-
0031382313
-
A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems
-
Fairfax, Virgina
-
E. Bertino, E. Ferrari, and V. Atluri. A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems. In Proceedings of the 2nd ACM Workshop on Role-based Access Control, Fairfax, Virgina, 1997.
-
(1997)
Proceedings of the 2nd ACM Workshop on Role-based Access Control
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
0002848811
-
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
February
-
E. Bertino, E. Ferrari, and V. Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security, 2(1):65-104, February 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
5
-
-
0028515494
-
Policy Resolution in Workflow Management Systems
-
C. J. Bussler. Policy Resolution in Workflow Management Systems. Digital Technical Journal, 6(4), 1994.
-
(1994)
Digital Technical Journal
, vol.6
, Issue.4
-
-
Bussler, C.J.1
-
6
-
-
0002937996
-
A Contex-Sensitive Access Control Model and Prototype Implementation
-
J. H. Eloff and S. Qing, editors, IFIP TC 11, Kluwer Academic Publishers, August
-
D. Cholewka, R. Botha, and J. Eloff. A Contex-Sensitive Access Control Model and Prototype Implementation. In J. H. Eloff and S. Qing, editors, 16th Annual Working Conference on Information Security, pages 341-350. IFIP TC 11, Kluwer Academic Publishers, August 2000.
-
(2000)
16th Annual Working Conference on Information Security
, pp. 341-350
-
-
Cholewka, D.1
Botha, R.2
Eloff, J.3
-
8
-
-
33747074188
-
An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure
-
D. Georgakopoulos, M. Hornick, and A. Sheth. An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure. Distributed and Parallel Databases, 3:119-153, 1995.
-
(1995)
Distributed and Parallel Databases
, vol.3
, pp. 119-153
-
-
Georgakopoulos, D.1
Hornick, M.2
Sheth, A.3
-
9
-
-
0026837237
-
Integration of User Authentication and Access Control
-
March
-
L. Harn and H. Lin. Integration of User Authentication and Access Control. IEE Proceedings-E, 139(2), March 1992.
-
(1992)
IEE Proceedings-E
, vol.139
, Issue.2
-
-
Harn, L.1
Lin, H.2
-
13
-
-
0013369183
-
Coloured Petri Nets - Basic Concepts, Analysis Methods and Practical Use
-
Springer
-
K. Jensen. Coloured Petri Nets - Basic Concepts, Analysis Methods and Practical Use, Volume 1-3. EATCS Monographs on Theoretical Computer Science. Springer, 1997.
-
(1997)
EATCS Monographs on Theoretical Computer Science
, vol.1-3
-
-
Jensen, K.1
-
15
-
-
0028089553
-
Managing Business Processes as an Information Resource
-
F. Leymann and W. Altenhuber. Managing Business Processes as an Information Resource. IBM Systems Journal, 33(2):326-348, 1994.
-
(1994)
IBM Systems Journal
, vol.33
, Issue.2
, pp. 326-348
-
-
Leymann, F.1
Altenhuber, W.2
-
16
-
-
0021474508
-
An Algorithm for the General Petri Net Reachability Problem
-
E. W. Mayr. An Algorithm for the General Petri Net Reachability Problem. SIAM Journal, 13(3):441-460, 1984.
-
(1984)
SIAM Journal
, vol.13
, Issue.3
, pp. 441-460
-
-
Mayr, E.W.1
-
18
-
-
0004068620
-
-
PhD thesis, Institut für instrumentelle Mathematik der Universität Bonn
-
C. A. Petri. Kommunikation mit Automaten. PhD thesis, Institut für instrumentelle Mathematik der Universität Bonn, 1962.
-
(1962)
Kommunikation Mit Automaten
-
-
Petri, C.A.1
-
20
-
-
0030086382
-
-
Feb
-
R. Sandhu. Role-Based Access Control Models. IEEE Computer, 29(2):34-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 34-47
-
-
Sandhu, R.1
-
21
-
-
84988603769
-
Towards a Task-based Paradigm for Flexible and Adaptable Access Control in Distributed Applications
-
Little Compton, RI
-
R. K. Thomas and R. S. Sandhu. Towards a Task-based Paradigm for Flexible and Adaptable Access Control in Distributed Applications. In Proceedings of the 1992-1993 ACM SIGSAC New Security Paradigms Workshop, pages 138-142, Little Compton, RI, 1993.
-
(1993)
Proceedings of the 1992-1993 ACM SIGSAC New Security Paradigms Workshop
, pp. 138-142
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
23
-
-
0002841051
-
Task-based Authorization Controls (TBAC): Models For Active and Enterprise-oriented Authorization Management
-
Lake Tahoe, CA, August
-
R. K. Thomas and R. S. Sandhu. Task-based Authorization Controls (TBAC): Models For Active and Enterprise-oriented Authorization Management. In Proceedings of the 11th IFIP WG 11.3 Conference on Database Security, Lake Tahoe, CA, August 1997.
-
(1997)
Proceedings of the 11th IFIP WG 11.3 Conference on Database Security
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
24
-
-
52449135365
-
Verification of Workflow Nets
-
P. Azema and G. Balbo, editors, Application and Theory of Petri Nets 1997, Springer-Verlag
-
W. van der Aalst. Verification of Workflow Nets. In P. Azema and G. Balbo, editors, Application and Theory of Petri Nets 1997, volume 1248 of Lecture Notes in Computer Science, pages 407-426. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1248
, pp. 407-426
-
-
Van Der Aalst, W.1
-
27
-
-
38249002954
-
On the Design of Dynamic Access Control Scheme with User Authentication
-
April
-
S. Yen and C. Laih. On the Design of Dynamic Access Control Scheme with User Authentication. Computer & Mathematics with Applications, 25(7):27-32, April 1993.
-
(1993)
Computer & Mathematics with Applications
, vol.25
, Issue.7
, pp. 27-32
-
-
Yen, S.1
Laih, C.2
|