|
Volumn 3826 LNCS, Issue , 2005, Pages 382-395
|
Trust-based secure workflow path construction
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER CRIME;
COMPUTER SCIENCE;
INFORMATION MANAGEMENT;
INFORMATION TECHNOLOGY;
PUBLIC POLICY;
STRATEGIC PLANNING;
COLLABORATION POLICIES;
SECURITY VIOLATIONS;
WORKFLOW MANAGEMENT;
WORKFLOW PATH CONSTRUCTION;
SECURITY OF DATA;
|
EID: 33744965347
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/11596141_29 Document Type: Conference Paper |
Times cited : (11)
|
References (21)
|