메뉴 건너뛰기




Volumn , Issue , 2006, Pages 233-253

Model driven security for inter-organizational workflows in e-government

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33750289802     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-138-4.ch014     Document Type: Chapter
Times cited : (2)

References (48)
  • 2
  • 3
    • 0346984145 scopus 로고    scopus 로고
    • San Mateo, CA, BPMI. org, 2002. Proposed Final Draft
    • Arkin, A. (2002). Business Process Modeling Language. San Mateo, CA, BPMI. org, 2002. Proposed Final Draft.
    • (2002) Business Process Modeling Language
    • Arkin, A.1
  • 6
    • 26844510421 scopus 로고    scopus 로고
    • Retrieved from
    • Austrian Security Manual. Retrieved from http://www.cio.gv.at/securenetworks/sihb/
    • Austrian Security Manual
  • 7
    • 84900623651 scopus 로고    scopus 로고
    • Art. 1 of the Act
    • Austrian Signature Act (Signaturgesetz - SigG), part I, Nr. 190/1999
    • Austrian Signature Act (Signaturgesetz - SigG). (1999). Art. 1 of the Act. Austrian Federal Law Gazette, part I, Nr. 190/1999.
    • (1999) Austrian Federal Law Gazette
  • 8
    • 4544279898 scopus 로고    scopus 로고
    • September, Retrieved from
    • Bajal S. et al. (2004, September). Web Services Policy Framework (WS-Policy). Retrieved from ftp://www6.software.ibm.com/software/developer/library/ws-policy.pdf
    • (2004) Web Services Policy Framework (WS-Policy)
    • Bajal, S.1
  • 9
    • 33646187282 scopus 로고    scopus 로고
    • A critical overview of the Web Services Choreography Description Language (WS-CDL)
    • Retrieved from
    • Barros, A., Dumas, M., & Oaks, P. (2005). A critical overview of the Web Services Choreography Description Language (WS-CDL). BPTrends News-letter, Vol. 3. Retrieved from http://www.bptrends.com/publicationfiles/03%2D05%20WP%20WS%2DCDL%20Barros%20et%20al.pdf
    • (2005) BPTrends News-letter , vol.3
    • Barros, A.1    Dumas, M.2    Oaks, P.3
  • 16
    • 78649297164 scopus 로고    scopus 로고
    • Modeling and Realizing Security-Critical Inter-Organizational Workflows
    • In W. Dosch & N. Debnath (Eds.), ISCA
    • Breu R., Hafner M., & Weber B. (2004). Modeling and Realizing Security-Critical Inter-Organizational Workflows. In W. Dosch & N. Debnath (Eds.), Proceedings IASSE 2004, ISCA.
    • (2004) Proceedings IASSE 2004
    • Breu, R.1    Hafner, M.2    Weber, B.3
  • 18
    • 0036099176 scopus 로고    scopus 로고
    • Event-based interaction management for composite e-services in e-flow
    • Casati, F., & Shan, M. (2002). Event-based interaction management for composite e-services in e-flow. Information Systems Frontiers.
    • (2002) Information Systems Frontiers
    • Casati, F.1    Shan, M.2
  • 22
    • 84970947585 scopus 로고    scopus 로고
    • Software engineering for security: A roadmap
    • In A. Finkelstein (Ed.), ACM Press
    • Devanbu, P., & Stubblebine, S. (2000). Software engineering for security: a roadmap. In A. Finkelstein (Ed.), The future of software engineering (pp. 227-239). ACM Press.
    • (2000) The Future of Software Engineering , pp. 227-239
    • Devanbu, P.1    Stubblebine, S.2
  • 23
    • 11044238224 scopus 로고    scopus 로고
    • XML Encryption Syntax and Processing
    • (Ed.), December 10, Retrieved from
    • Eastlake D. et al. (Ed.) (2002, December 10). XML Encryption Syntax and Processing. W3C Recommendation. Retrieved from http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/
    • (2002) W3C Recommendation
    • Eastlake, D.1
  • 24
    • 84900577817 scopus 로고    scopus 로고
    • Art. 1 of the Act
    • Federal Act on Provisions Facilitating Electronic Communications with Public Bodies (E-Government Gesetz - E-GovG), March 1, part I, Nr. 10/2004
    • Federal Act on Provisions Facilitating Electronic Communications with Public Bodies (E-Government Gesetz - E-GovG). (2004, March 1). Art. 1 of the Act. Austrian Federal Law Gazette, part I, Nr. 10/2004.
    • (2004) Austrian Federal Law Gazette
  • 25
    • 84900667038 scopus 로고    scopus 로고
    • Federal Act concerning the Protection of Personal Data (Datenschutzgesetz - DSG2000), August 17, part I No. 165/1999
    • Federal Act concerning the Protection of Personal Data (Datenschutzgesetz - DSG2000). (1999, August 17). Austrian Federal Law Gazette, part I No. 165/1999.
    • (1999) Austrian Federal Law Gazette
  • 29
    • 0033329699 scopus 로고    scopus 로고
    • Modelling, specifying and implementing workflow security in cyberspace
    • Gudes, E., Olivier, M., & van de Riet, R. (1999). Modelling, specifying and implementing workflow security in cyberspace. Journal of Computer.
    • (1999) Journal of Computer
    • Gudes, E.1    Olivier, M.2    van de Riet, R.3
  • 31
    • 38349165472 scopus 로고    scopus 로고
    • A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together
    • In C. S. Chen, J. Filipe, et al. (Eds.)
    • Hafner M., Breu R., & Breu M. (2005). A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together. In C. S. Chen, J. Filipe, et al. (Eds.), Proceedings ICEIS 2005.
    • (2005) Proceedings ICEIS 2005
    • Hafner, M.1    Breu, R.2    Breu, M.3
  • 33
    • 0036149234 scopus 로고    scopus 로고
    • Correctness by construction developing a commercial secure system
    • Hall A., Chapman R. (2002). Correctness by construction developing a commercial secure system. IEEE Software, 19(1) 18-25.
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 18-25
    • Hall, A.1    Chapman, R.2
  • 35
    • 84900644672 scopus 로고    scopus 로고
    • Retrieved from
    • IBM: BPWS4J. Retrieved from http://www.alphaworks.ibm.com/tech/bpws4j
    • IBM: BPWS4J
  • 38
    • 61849168397 scopus 로고    scopus 로고
    • Production workflow: Concepts and techniques
    • Retrieved from
    • Leyman, F., & Roller, D. (2000). Production workflow: Concepts and techniques. Prentice-Hall. Retrieved from http://www.uml.org
    • (2000) Prentice-Hall
    • Leyman, F.1    Roller, D.2
  • 42
    • 33846208353 scopus 로고    scopus 로고
    • OECD Guidelines for the Security of Information Systems and Networks. URL
    • Mantell, K. (2003). From UML to BPEL. IBM-developerWorks. OECD Guidelines for the Security of Information Systems and Networks. URL: http://www.ftc.gov/bcp/conline/edcams/infosecurity/popups/OECD_guide-line.pdf
    • (2003) From UML to BPEL. IBM-developerWorks
    • Mantell, K.1
  • 44
    • 0033319977 scopus 로고    scopus 로고
    • Process-oriented Architectures for Electronic Commerce and Interorganizational Workflow
    • Van der Aalst, W. M. P. (1999). Process-oriented Architectures for Electronic Commerce and Interorganizational Workflow. Information Systems.
    • (1999) Information Systems
    • Van der Aalst, W.M.P.1
  • 45
    • 0002422416 scopus 로고    scopus 로고
    • Loosely coupled interorganizational workflows: Modeling and analyzing workflows crossing organizational boundaries
    • Van der Aalst, W. M. P. (2000). Loosely coupled interorganizational workflows: Modeling and analyzing workflows crossing organizational boundaries. In formation and Management.
    • (2000) Formation and Management
    • Van der Aalst, W.M.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.