메뉴 건너뛰기




Volumn 12, Issue 6, 2004, Pages 799-840

Chinese wall security for decentralized workflow management systems

Author keywords

Chinese wall security; Distributed Systems; Workflow management systems

Indexed keywords

AUTOMATION; DISTRIBUTED COMPUTER SYSTEMS; MATHEMATICAL MODELS; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 20844432808     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2004-12601     Document Type: Article
Times cited : (14)

References (27)
  • 3
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • Proceedings of the Fifth European Symposium on Research in Computer Security, Springer
    • V. Atluri and W.-K. Huang, An authorization model for workflows, in: Proceedings of the Fifth European Symposium on Research in Computer Security, in Lecture Notes in Computer Science, No. 1146, Springer, 1996.
    • (1996) Lecture Notes in Computer Science, No. 1146 , vol.1146
    • Atluri, V.1    Huang, W.-K.2
  • 4
    • 0031382313 scopus 로고    scopus 로고
    • A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems
    • E. Bertino, E. Ferrari and V. Atluri, A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems, in: Proc. of the 2nd ACM Workshop on Role-based Access Control, 1997.
    • (1997) Proc. of the 2nd ACM Workshop on Role-based Access Control
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 0003396723 scopus 로고    scopus 로고
    • PhD thesis, Computer Science Department, Princeton University
    • R. Dean, Formal aspects of mobile code security, PhD thesis, Computer Science Department, Princeton University, 1999.
    • (1999) Formal Aspects of Mobile Code Security
    • Dean, R.1
  • 9
    • 33747074188 scopus 로고
    • An overview of workflow management: From process modeling to workflow automation infrastructure
    • D. Georgakopoulos, M. Hornick and A. Sheth, An overview of workflow management: from process modeling to workflow automation infrastructure, in: Distributed and Parallel Databases, 1995, pp. 119-153.
    • (1995) Distributed and Parallel Databases , pp. 119-153
    • Georgakopoulos, D.1    Hornick, M.2    Sheth, A.3
  • 12
    • 0008235326 scopus 로고    scopus 로고
    • Security for the meteor workflow management system
    • University of Georgia, June
    • J.A. Miller, M. Fan, S. Wu, I.B. Arpinar, A.P. Sheth and K.J. Kochut, Security for the meteor workflow management system. Technical Report UGA-CS-LSDIS-TR-99-010, University of Georgia, June 1999.
    • (1999) Technical Report , vol.UGA-CS-LSDIS-TR-99-010
    • Miller, J.A.1    Fan, M.2    Wu, S.3    Arpinar, I.B.4    Sheth, A.P.5    Kochut, K.J.6
  • 19
    • 0026366942 scopus 로고
    • Specifying interdatabase dependencies in a multidatabase environment
    • M. Rusinkiewicz, A. Sheth and G. Karabatis, Specifying interdatabase dependencies in a multidatabase environment, IEEE Computer 24(12) (1991), 46-53.
    • (1991) IEEE Computer , vol.24 , Issue.12 , pp. 46-53
    • Rusinkiewicz, M.1    Sheth, A.2    Karabatis, G.3
  • 20
  • 21
    • 33744792687 scopus 로고    scopus 로고
    • Implementing distributed workflow systems from XML specifications
    • Department of Computer Science, University of Minnesota, May
    • A. Tripathi, T. Ahmed, V. Kakani and S. Jaman, Implementing distributed workflow systems from XML specifications, Technical report, Department of Computer Science, University of Minnesota, May 2000. Available at http://www.cs.umn.edu/Ajanta.
    • (2000) Technical Report
    • Tripathi, A.1    Ahmed, T.2    Kakani, V.3    Jaman, S.4
  • 24
    • 27844607906 scopus 로고    scopus 로고
    • The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system
    • Muldersdrift, South Africa, (published electronically)
    • K. Venter and M.S.Olivier, The delegation authorization model: a model for the dynamic delegation of authorization rights in a secure workflow management system, in: ISSA2002, Muldersdrift, South Africa, 2002 (published electronically).
    • (2002) ISSA2002
    • Venter, K.1    Olivier, M.S.2
  • 26
    • 0003396725 scopus 로고    scopus 로고
    • PhD thesis, Computer Science Department, Princeton University
    • D.S. Wallach, A new approach to mobile security, PhD thesis, Computer Science Department, Princeton University, 1999.
    • (1999) A New Approach to Mobile Security
    • Wallach, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.