메뉴 건너뛰기




Volumn 3760 LNCS, Issue , 2005, Pages 59-76

Balancing flexibility and security in adaptive process management systems

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE ALGORITHMS; ADMINISTRATIVE DATA PROCESSING; COGNITIVE SYSTEMS; CRYPTOGRAPHY; INFORMATION MANAGEMENT; INFORMATION TECHNOLOGY; USER INTERFACES;

EID: 33646676768     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11575771_7     Document Type: Conference Paper
Times cited : (35)

References (27)
  • 1
    • 0032024112 scopus 로고    scopus 로고
    • flex - Supporting dynamic changes of workflows without losing control
    • flex - supporting dynamic changes of workflows without losing control. JUS 10 (1998) 93-129
    • (1998) JUS , vol.10 , pp. 93-129
    • Reichert, M.1    Dadam, P.2
  • 2
    • 25144465790 scopus 로고    scopus 로고
    • PhD thesis, Norwegian University of Science and Technology, Trondheim, Norway
    • Jørgensen, H.D.: Interactive Process Models. PhD thesis, Norwegian University of Science and Technology, Trondheim, Norway (2004)
    • (2004) Interactive Process Models
    • Jørgensen, H.D.1
  • 3
    • 2542499112 scopus 로고    scopus 로고
    • Correctness criteria for dynamic changes in workflow systems - A survey. Data and knowledge engineering
    • Rinderle, S., Reichert, M., Dadam, P.: Correctness criteria for dynamic changes in workflow systems - a survey. Data and Knowledge Engineering, Special Issue on Advances in Business Process Management 50 (2004) 9-34
    • (2004) Special Issue on Advances in Business Process Management , vol.50 , pp. 9-34
    • Rinderle, S.1    Reichert, M.2    Dadam, P.3
  • 5
    • 0037028431 scopus 로고    scopus 로고
    • Inheritance of workflows: An approach to tackling problems related to change
    • v.d. Aalst, W., Basten, T.: Inheritance of workflows: An approach to tackling problems related to change. Theoret. Comp. Science 270 (2002) 125-203
    • (2002) Theoret. Comp. Science , vol.270 , pp. 125-203
    • Aalst, V.D.W.1    Basten, T.2
  • 6
    • 84976676824 scopus 로고
    • Exceptions and exception handling in computerized information processes
    • Strong, D., Miller, S.: Exceptions and exception handling in computerized information processes. ACM-TOIS 13 (1995) 206-233
    • (1995) ACM-TOIS , vol.13 , pp. 206-233
    • Strong, D.1    Miller, S.2
  • 7
    • 35048847096 scopus 로고    scopus 로고
    • CBRFlow: Enabling adaptive workflow management through conversational case-based reasoning
    • Madrid
    • Weber, B., Wild, W., Breu, R.: CBRFlow: Enabling adaptive workflow management through conversational case-based reasoning. In: Proc. Eurpean Conf. on Case-based Reasoning (ECCBR'04), Madrid (2004) 434-448
    • (2004) Proc. Eurpean Conf. on Case-based Reasoning (ECCBR'04) , pp. 434-448
    • Weber, B.1    Wild, W.2    Breu, R.3
  • 10
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC - A workflow security model incorporating controlled overriding of constraints
    • Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - a workflow security model incorporating controlled overriding of constraints. IJCIS 12 (2003) 455-485
    • (2003) IJCIS , vol.12 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3
  • 11
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in wfms
    • Bertino, E., Ferrari, E., Alturi, V.: The specification and enforcement of authorization constraints in wfms. ACM Trans. on Inf. and Sys. Sec. 2 (1999) 65-104
    • (1999) ACM Trans. on Inf. and Sys. Sec. , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Alturi, V.3
  • 13
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • Casati, F., Castano, S., Fugini, M.: Managing workflow authorization constraints through active database technology. Inf. Sys. Frontiers. 3 (2001) 319-338
    • (2001) Inf. Sys. Frontiers. , vol.3 , pp. 319-338
    • Casati, F.1    Castano, S.2    Fugini, M.3
  • 14
    • 4444319368 scopus 로고    scopus 로고
    • Role-based authorization for workflow systems in support of task-based separation of duty
    • Liu, D.R., Wu, M.Y., Lee, S.T.: Role-based authorization for workflow systems in support of task-based separation of duty. The Journal of Systems and Software. 73 (2004) 375-387
    • (2004) The Journal of Systems and Software , vol.73 , pp. 375-387
    • Liu, D.R.1    Wu, M.Y.2    Lee, S.T.3
  • 16
    • 0031355379 scopus 로고    scopus 로고
    • Enforcing mandatory and discretionary security in workflow management systems
    • Atluri, V., Huang, W.K.: Enforcing mandatory and discretionary security in workflow management systems. Journal of Computer Security. 5 (1997) 303-339
    • (1997) Journal of Computer Security , vol.5 , pp. 303-339
    • Atluri, V.1    Huang, W.K.2
  • 17
    • 0142250279 scopus 로고    scopus 로고
    • Authorization and access control in adaptive workflows
    • Domingos, D., Rito-Silva, A., Veiga, P.: Authorization and access control in adaptive workflows. In: ESORICS 2003. (2003) 23-38
    • (2003) ESORICS 2003 , pp. 23-38
    • Domingos, D.1    Rito-Silva, A.2    Veiga, P.3
  • 19
    • 33646676482 scopus 로고    scopus 로고
    • Integrating process learning and process evolution - A semantics based approach
    • Rinderle, S., Weber, B., Reichert, M., Wild, W.: Integrating process learning and process evolution - a semantics based approach. In: BPM 2005. (2005)
    • (2005) BPM 2005
    • Rinderle, S.1    Weber, B.2    Reichert, M.3    Wild, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.