메뉴 건너뛰기




Volumn 2000-January, Issue , 2000, Pages 159-167

Dynamic access control through Petri net workflows

Author keywords

Access control; Authorization; Equations; Information systems; Information technology; Mathematical model; Permission; Petri nets; Protection; Solid modeling

Indexed keywords

INFORMATION SYSTEMS; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS; PETRI NETS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 1642309744     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2000.898869     Document Type: Conference Paper
Times cited : (74)

References (27)
  • 1
    • 0032027597 scopus 로고    scopus 로고
    • Modeling and Analysis of Workflows Using Petri Nets
    • Special Issue on Workflow and Process Management, March
    • N. R. Adam, V. Atluri, and W.-K. Huang. Modeling and Analysis of Workflows Using Petri Nets. Journal of Intelligent Information Systems, Special Issue on Workflow and Process Management, 10(2):131-158, March 1998.
    • (1998) Journal of Intelligent Information Systems , vol.10 , Issue.2 , pp. 131-158
    • Adam, N.R.1    Atluri, V.2    Huang, W.-K.3
  • 3
    • 0031382313 scopus 로고    scopus 로고
    • A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems
    • Fairfax, Virgina
    • E. Bertino, E. Ferrari, and V. Atluri. A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems. In Proceedings of the 2nd ACM Workshop on Role-based Access Control, Fairfax, Virgina, 1997.
    • (1997) Proceedings of the 2nd ACM Workshop on Role-based Access Control
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • February
    • E. Bertino, E. Ferrari, and V. Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security, 2(1):65-104, February 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 5
    • 0028515494 scopus 로고
    • Policy Resolution in Workflow Management Systems
    • C. J. Bussler. Policy Resolution in Workflow Management Systems. Digital Technical Journal, 6(4), 1994.
    • (1994) Digital Technical Journal , vol.6 , Issue.4
    • Bussler, C.J.1
  • 6
    • 0002937996 scopus 로고    scopus 로고
    • A Contex-Sensitive Access Control Model and Prototype Implementation
    • J. H. Eloff and S. Qing, editors, IFIP TC 11, Kluwer Academic Publishers, August
    • D. Cholewka, R. Botha, and J. Eloff. A Contex-Sensitive Access Control Model and Prototype Implementation. In J. H. Eloff and S. Qing, editors, 16th Annual Working Conference on Information Security, pages 341-350. IFIP TC 11, Kluwer Academic Publishers, August 2000.
    • (2000) 16th Annual Working Conference on Information Security , pp. 341-350
    • Cholewka, D.1    Botha, R.2    Eloff, J.3
  • 8
    • 33747074188 scopus 로고
    • An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure
    • D. Georgakopoulos, M. Hornick, and A. Sheth. An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure. Distributed and Parallel Databases, 3:119-153, 1995.
    • (1995) Distributed and Parallel Databases , vol.3 , pp. 119-153
    • Georgakopoulos, D.1    Hornick, M.2    Sheth, A.3
  • 9
    • 0026837237 scopus 로고
    • Integration of User Authentication and Access Control
    • March
    • L. Harn and H. Lin. Integration of User Authentication and Access Control. IEE Proceedings-E, 139(2), March 1992.
    • (1992) IEE Proceedings-E , vol.139 , Issue.2
    • Harn, L.1    Lin, H.2
  • 13
    • 0013369183 scopus 로고    scopus 로고
    • Coloured Petri Nets - Basic Concepts, Analysis Methods and Practical Use
    • Springer
    • K. Jensen. Coloured Petri Nets - Basic Concepts, Analysis Methods and Practical Use, Volume 1-3. EATCS Monographs on Theoretical Computer Science. Springer, 1997.
    • (1997) EATCS Monographs on Theoretical Computer Science , vol.1-3
    • Jensen, K.1
  • 15
    • 0028089553 scopus 로고
    • Managing Business Processes as an Information Resource
    • F. Leymann and W. Altenhuber. Managing Business Processes as an Information Resource. IBM Systems Journal, 33(2):326-348, 1994.
    • (1994) IBM Systems Journal , vol.33 , Issue.2 , pp. 326-348
    • Leymann, F.1    Altenhuber, W.2
  • 16
    • 0021474508 scopus 로고
    • An Algorithm for the General Petri Net Reachability Problem
    • E. W. Mayr. An Algorithm for the General Petri Net Reachability Problem. SIAM Journal, 13(3):441-460, 1984.
    • (1984) SIAM Journal , vol.13 , Issue.3 , pp. 441-460
    • Mayr, E.W.1
  • 18
    • 0004068620 scopus 로고
    • PhD thesis, Institut für instrumentelle Mathematik der Universität Bonn
    • C. A. Petri. Kommunikation mit Automaten. PhD thesis, Institut für instrumentelle Mathematik der Universität Bonn, 1962.
    • (1962) Kommunikation Mit Automaten
    • Petri, C.A.1
  • 20
    • 0030086382 scopus 로고    scopus 로고
    • Feb
    • R. Sandhu. Role-Based Access Control Models. IEEE Computer, 29(2):34-47, Feb. 1996.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 34-47
    • Sandhu, R.1
  • 21
    • 84988603769 scopus 로고
    • Towards a Task-based Paradigm for Flexible and Adaptable Access Control in Distributed Applications
    • Little Compton, RI
    • R. K. Thomas and R. S. Sandhu. Towards a Task-based Paradigm for Flexible and Adaptable Access Control in Distributed Applications. In Proceedings of the 1992-1993 ACM SIGSAC New Security Paradigms Workshop, pages 138-142, Little Compton, RI, 1993.
    • (1993) Proceedings of the 1992-1993 ACM SIGSAC New Security Paradigms Workshop , pp. 138-142
    • Thomas, R.K.1    Sandhu, R.S.2
  • 23
    • 0002841051 scopus 로고    scopus 로고
    • Task-based Authorization Controls (TBAC): Models For Active and Enterprise-oriented Authorization Management
    • Lake Tahoe, CA, August
    • R. K. Thomas and R. S. Sandhu. Task-based Authorization Controls (TBAC): Models For Active and Enterprise-oriented Authorization Management. In Proceedings of the 11th IFIP WG 11.3 Conference on Database Security, Lake Tahoe, CA, August 1997.
    • (1997) Proceedings of the 11th IFIP WG 11.3 Conference on Database Security
    • Thomas, R.K.1    Sandhu, R.S.2
  • 24
    • 52449135365 scopus 로고    scopus 로고
    • Verification of Workflow Nets
    • P. Azema and G. Balbo, editors, Application and Theory of Petri Nets 1997, Springer-Verlag
    • W. van der Aalst. Verification of Workflow Nets. In P. Azema and G. Balbo, editors, Application and Theory of Petri Nets 1997, volume 1248 of Lecture Notes in Computer Science, pages 407-426. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1248 , pp. 407-426
    • Van Der Aalst, W.1
  • 27
    • 38249002954 scopus 로고
    • On the Design of Dynamic Access Control Scheme with User Authentication
    • April
    • S. Yen and C. Laih. On the Design of Dynamic Access Control Scheme with User Authentication. Computer & Mathematics with Applications, 25(7):27-32, April 1993.
    • (1993) Computer & Mathematics with Applications , vol.25 , Issue.7 , pp. 27-32
    • Yen, S.1    Laih, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.