메뉴 건너뛰기




Volumn 4102 LNCS, Issue , 2006, Pages 439-444

Verifying BPEL workflows under authorisation constraints

Author keywords

BPEL; Model checking; RBAC; Workflow

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SIMULATION; CONSTRAINT THEORY; DATA FLOW ANALYSIS; FORMAL LOGIC; INFORMATION SERVICES; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33749984776     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (10)
  • 1
    • 0033650839 scopus 로고    scopus 로고
    • Injecting RBAC to secure a web-based workflow system
    • ACM Press
    • G. Ahn, R. Sandhu, M. Kang, and J. Park. Injecting RBAC to secure a web-based workflow system. In Proc. of RBAC '00. ACM Press, 2000.
    • (2000) Proc. of RBAC '00
    • Ahn, G.1    Sandhu, R.2    Kang, M.3    Park, J.4
  • 3
    • 84941152012 scopus 로고    scopus 로고
    • Web services business process execution language version 2.0
    • BPEL 2.0 Working Draft. Web services business process execution language version 2.0. http://www.oasis-open.org/apps/org/workgroup/wsbpel/. 2004.
    • (2004) BPEL 2.0 Working Draft
  • 4
    • 19944405131 scopus 로고    scopus 로고
    • Analysis of interacting BPEL web services
    • ACM Press
    • X. Fu, T. Bultan, and J. Su. Analysis of interacting BPEL web services. In Proc. of WWW '04. ACM Press, 2004.
    • (2004) Proc. of WWW '04
    • Fu, X.1    Bultan, T.2    Su, J.3
  • 6
    • 85117415611 scopus 로고    scopus 로고
    • Verifying workflow processes against organization security policies
    • IEEE Computer Society
    • C. Ribeiro and P. Guedes. Verifying workflow processes against organization security policies. In WETICE99'. IEEE Computer Society, 1999.
    • (1999) WETICE99'
    • Ribeiro, C.1    Guedes, P.2
  • 7
    • 84941151120 scopus 로고    scopus 로고
    • SAL. Symbolic analysis laboratory, http://sal.csl.sri.com/.
  • 8
    • 4944250730 scopus 로고    scopus 로고
    • The consistency of task-based authorization constraints in workflow systems
    • K. Tan, J. Crampton, and C. Gunter. The consistency of task-based authorization constraints in workflow systems. In Proc. of CSFW'04, 2004.
    • (2004) Proc. of CSFW'04
    • Tan, K.1    Crampton, J.2    Gunter, C.3
  • 10
    • 33750027244 scopus 로고    scopus 로고
    • Modelling and resource allocation planning of BPEL workflows under security constraints
    • UNU-IIST
    • X. Zhao, A. Cerone, and P. Krishnan. Modelling and resource allocation planning of BPEL workflows under security constraints. Technical Report 336, UNU-IIST, 2006. http://www.iist.unu.edu/.
    • (2006) Technical Report , vol.336
    • Zhao, X.1    Cerone, A.2    Krishnan, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.