-
1
-
-
0032027597
-
Modeling and analysis of workflows using Petri nets
-
N.R. Adam, V. Atluri and W.-K. Huang, Modeling and analysis of workflows using Petri nets, Journal of Intelligent Information Systems, Special Issue on Workflow and Process Management 10(2) (1998).
-
(1998)
Journal of Intelligent Information Systems, Special Issue on Workflow and Process Management
, vol.10
, Issue.2
-
-
Adam, N.R.1
Atluri, V.2
Huang, W.-K.3
-
2
-
-
0001078603
-
EXotica/FMQM: A persistent message-based architecture for distributed workflow management
-
Trond-heim
-
G. Alonso, D. Agrawal, A. El Abbadi, C. Mohan, R. Gunthor and M. Kamath, EXotica/FMQM: a persistent message-based architecture for distributed workflow management, in: Proceedings of the IFIP WG8.1 Working Conference on Information Systems for Decentralized Organizations, Trond-heim, 1995.
-
(1995)
Proceedings of the IFIP WG8.1 Working Conference on Information Systems for Decentralized Organizations
-
-
Alonso, G.1
Agrawal, D.2
El Abbadi, A.3
Mohan, C.4
Gunthor, R.5
Kamath, M.6
-
3
-
-
84949747356
-
An authorization model for workflows
-
Proceedings of the Fifth European Symposium on Research in Computer Security, Springer
-
V. Atluri and W.-K. Huang, An authorization model for workflows, in: Proceedings of the Fifth European Symposium on Research in Computer Security, in Lecture Notes in Computer Science, No. 1146, Springer, 1996.
-
(1996)
Lecture Notes in Computer Science, No. 1146
, vol.1146
-
-
Atluri, V.1
Huang, W.-K.2
-
4
-
-
0031382313
-
A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems
-
E. Bertino, E. Ferrari and V. Atluri, A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems, in: Proc. of the 2nd ACM Workshop on Role-based Access Control, 1997.
-
(1997)
Proc. of the 2nd ACM Workshop on Role-based Access Control
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
6
-
-
0003442571
-
2
-
University of Georgia, February
-
2, Technical Report UGA-CS-TR-97-001, University of Georgia, February 1997.
-
(1997)
Technical Report
, vol.UGA-CS-TR-97-001
-
-
Das, S.1
Kochut, K.2
Miller, J.3
Sheth, A.4
Worah, D.5
-
7
-
-
0003396723
-
-
PhD thesis, Computer Science Department, Princeton University
-
R. Dean, Formal aspects of mobile code security, PhD thesis, Computer Science Department, Princeton University, 1999.
-
(1999)
Formal Aspects of Mobile Code Security
-
-
Dean, R.1
-
9
-
-
33747074188
-
An overview of workflow management: From process modeling to workflow automation infrastructure
-
D. Georgakopoulos, M. Hornick and A. Sheth, An overview of workflow management: from process modeling to workflow automation infrastructure, in: Distributed and Parallel Databases, 1995, pp. 119-153.
-
(1995)
Distributed and Parallel Databases
, pp. 119-153
-
-
Georgakopoulos, D.1
Hornick, M.2
Sheth, A.3
-
11
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
ACM Press
-
M.H. Kang, J.S. Park and J.N. Froscher, Access control mechanisms for inter-organizational workflow, in: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, ACM Press, 2001, pp. 66-74.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 66-74
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
12
-
-
0008235326
-
Security for the meteor workflow management system
-
University of Georgia, June
-
J.A. Miller, M. Fan, S. Wu, I.B. Arpinar, A.P. Sheth and K.J. Kochut, Security for the meteor workflow management system. Technical Report UGA-CS-LSDIS-TR-99-010, University of Georgia, June 1999.
-
(1999)
Technical Report
, vol.UGA-CS-LSDIS-TR-99-010
-
-
Miller, J.A.1
Fan, M.2
Wu, S.3
Arpinar, I.B.4
Sheth, A.P.5
Kochut, K.J.6
-
18
-
-
0002012872
-
Specification and execution of transactional workflows
-
W. Kim, ed., Addison-Wesley
-
M. Rusinkiewicz and A. Sheth, Specification and execution of transactional workflows, in: Modern Database Systems: The Object Model, Interoperability and Beyond, W. Kim, ed., Addison-Wesley, 1994.
-
(1994)
Modern Database Systems: The Object Model, Interoperability and beyond
-
-
Rusinkiewicz, M.1
Sheth, A.2
-
19
-
-
0026366942
-
Specifying interdatabase dependencies in a multidatabase environment
-
M. Rusinkiewicz, A. Sheth and G. Karabatis, Specifying interdatabase dependencies in a multidatabase environment, IEEE Computer 24(12) (1991), 46-53.
-
(1991)
IEEE Computer
, vol.24
, Issue.12
, pp. 46-53
-
-
Rusinkiewicz, M.1
Sheth, A.2
Karabatis, G.3
-
20
-
-
0002604871
-
A lattice interpretation of the Chinese Wall policy
-
Washington, DC
-
R.S. Sandhu, A lattice interpretation of the Chinese Wall Policy, in: Proc. of the 15th NIST-NCSC Computer Security Conf., Washington, DC, 1992, pp. 329-339.
-
(1992)
Proc. of the 15th NIST-NCSC Computer Security Conf.
, pp. 329-339
-
-
Sandhu, R.S.1
-
21
-
-
33744792687
-
Implementing distributed workflow systems from XML specifications
-
Department of Computer Science, University of Minnesota, May
-
A. Tripathi, T. Ahmed, V. Kakani and S. Jaman, Implementing distributed workflow systems from XML specifications, Technical report, Department of Computer Science, University of Minnesota, May 2000. Available at http://www.cs.umn.edu/Ajanta.
-
(2000)
Technical Report
-
-
Tripathi, A.1
Ahmed, T.2
Kakani, V.3
Jaman, S.4
-
23
-
-
4344645819
-
A coordination model for secure distributed collaboration
-
CRC Press
-
A. Tripathi, T. Ahmed, R. Kumar and S. Jaman, A coordination model for secure distributed collaboration, in: Proceedings of Workshop on Internet Process Coordination and Ubiquitous Computing, CRC Press, 2001.
-
(2001)
Proceedings of Workshop on Internet Process Coordination and Ubiquitous Computing
-
-
Tripathi, A.1
Ahmed, T.2
Kumar, R.3
Jaman, S.4
-
24
-
-
27844607906
-
The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system
-
Muldersdrift, South Africa, (published electronically)
-
K. Venter and M.S.Olivier, The delegation authorization model: a model for the dynamic delegation of authorization rights in a secure workflow management system, in: ISSA2002, Muldersdrift, South Africa, 2002 (published electronically).
-
(2002)
ISSA2002
-
-
Venter, K.1
Olivier, M.S.2
-
26
-
-
0003396725
-
-
PhD thesis, Computer Science Department, Princeton University
-
D.S. Wallach, A new approach to mobile security, PhD thesis, Computer Science Department, Princeton University, 1999.
-
(1999)
A New Approach to Mobile Security
-
-
Wallach, D.S.1
|