-
1
-
-
0008162190
-
Workflow security considerations - White paper
-
Workflow Management Coalition
-
Workflow Management Coalition, "Workflow Security Considerations - White Paper," Technical Report WFMC-TC-1019, Workflow Management Coalition, 1998. http://www.wfmc.org
-
(1998)
Technical Report
, vol.WFMC-TC-1019
-
-
-
2
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, "Role-Based Access Control Models", IEEE Computer, 29(2): 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
3
-
-
30644466528
-
Secure role-based work-flow models
-
Kluwer Press, July
-
S. Kandala, R.S. Sandhu, "Secure Role-Based Work-flow Models", Proceedings of IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application Security, Kluwer Press, July 2001, pp.45-58.
-
(2001)
Proceedings of IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application Security
, pp. 45-58
-
-
Kandala, S.1
Sandhu, R.S.2
-
4
-
-
0002848811
-
Specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, V. Atluri, "Specification and Enforcement of Authorization Constraints in Workflow Management Systems", ACM Transactions on Information and System Security, 2(1): 65-104, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
5
-
-
0008235326
-
Security for the METEOR workflow management system
-
University of Georgia, June
-
J. Miller, M. Fan, S. Wu, I. B. Arpinar, A. Sheth, K. Kochut, "Security for the METEOR Workflow Management System", Technical Report UGA-CS-LSDIS-TR-99-010, University of Georgia, June 1999. http://webster.cs. uga.edu/~budak/papers/security_report.pdf
-
(1999)
Technical Report
, vol.UGA-CS-LSDIS-TR-99-010
-
-
Miller, J.1
Fan, M.2
Wu, S.3
Arpinar, I.B.4
Sheth, A.5
Kochut, K.6
-
6
-
-
84988789822
-
Conceptual foundations for a model of task-based authorizations
-
IEEE Press, June
-
R.K. Thomas, R.S. Sandhu, "Conceptual Foundations for a Model of Task-Based Authorizations", Proceedings of the Computer Security Foundations Workshop VII, IEEE Press, June 1994, pp.66-79.
-
(1994)
Proceedings of the Computer Security Foundations Workshop VII
, pp. 66-79
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
7
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
Chapman & Hall Press, August
-
R.K. Thomas, R.S. Sandhu, "Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management", Proceedings of the IFIP TC11/WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, Chapman & Hall Press, August 1997, pp.166-181.
-
(1997)
Proceedings of the IFIP TC11/WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
8
-
-
26644446327
-
Issues in document security enforcement for activity execution in CapBasED-AMS
-
IEEE Press, January
-
K. Karlapalem, J. Gray. III., P.C.K Hung, "Issues in Document Security Enforcement for Activity Execution in CapBasED-AMS", Proceedings of 12th International Conference on Information Networking, IEEE Press, January 1998, pp.96-99.
-
(1998)
Proceedings of 12th International Conference on Information Networking
, pp. 96-99
-
-
Karlapalem, K.1
Gray III., J.2
Hung, P.C.K.3
-
11
-
-
0025099231
-
Some conundrums concerning separation of duty
-
IEEE Press, May
-
M.J. Nash, K.R. Poland, "Some Conundrums Concerning Separation of Duty", Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Press, May 1990, pp.201-207
-
(1990)
Proceedings of the 1990 IEEE Symposium on Security and Privacy
, pp. 201-207
-
-
Nash, M.J.1
Poland, K.R.2
-
12
-
-
84955590178
-
Analyzing separation of duties in petri net workflows
-
Springer Press, May
-
K. Konstantin, W. Harald, "Analyzing Separation of Duties in Petri Net Workflows", Proceedings of the International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, Springer Press, May 2001, pp.102-114.
-
(2001)
Proceedings of the International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security
, pp. 102-114
-
-
Konstantin, K.1
Harald, W.2
-
13
-
-
18744406526
-
Separation of duty administration
-
S. Perelson, R. Botha, J. Eloff, "Separation of Duty Administration", South African Computer Journal, 27:64-69, 2001.
-
(2001)
South African Computer Journal
, vol.27
, pp. 64-69
-
-
Perelson, S.1
Botha, R.2
Eloff, J.3
|