-
1
-
-
0030086382
-
Role-based access control models
-
Sandhu R., Coyne E., Feinstein H., and Youman C. Role-based access control models. IEEE Comput. 29 2 (1996) 38-47
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
2
-
-
84892711302
-
-
E.S. Barka, R. Sandhu, Framework for role-based delegation models, in: 16th Annual Computer Security Applications Conference, December 2000. http://www.acsac.org/2000/abstracts/34.html.
-
-
-
-
3
-
-
33751425833
-
-
E.S. Barka, R. Sandhu, A role-based delegation model and some extensions, in: 23rd National Information Systems Security Conference, October 2000. http://csrc.nist.gov/nissc/2000/proceedings/papers/021.pdf.
-
-
-
-
6
-
-
0348209180
-
WRBAC-a workflow security model incorporating controlled overriding of constraints
-
Wainer J., Kumar A., and Barthelmess P. WRBAC-a workflow security model incorporating controlled overriding of constraints. Int. J. Coop. Inf. Syst. 12 4 (2003) 455-486
-
(2003)
Int. J. Coop. Inf. Syst.
, vol.12
, Issue.4
, pp. 455-486
-
-
Wainer, J.1
Kumar, A.2
Barthelmess, P.3
-
8
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino E., Ferrari E., and Atluri V. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2 1 (1999) 65-104
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
9
-
-
0035676950
-
Dynamic work distribution in workflow management systems: how to balance quality and performance?
-
Kumar A., van der Aalst W.M.P., and Verbeek H.M.W. Dynamic work distribution in workflow management systems: how to balance quality and performance?. J. MIS 18 3 (2002) 157-193
-
(2002)
J. MIS
, vol.18
, Issue.3
, pp. 157-193
-
-
Kumar, A.1
van der Aalst, W.M.P.2
Verbeek, H.M.W.3
-
11
-
-
0008724838
-
An authorization model for temporal and derived data: securing information portals
-
V. Atluri, and A. Gal. An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur. 5 1 (2002) 62-94
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.1
, pp. 62-94
-
-
V. Atluri1
A. Gal2
-
12
-
-
0242540371
-
-
X. Zhang, S. Oh, R. Sandhu, in: PBDM: a flexible delegation model in RBAC, SACMAT '03: Proceedings of the Eighth ACM symposium on Access Control Models and Technologies, ACM Press, New York, 2003, pp.149-157.
-
-
-
-
13
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
Zhang L., Ahn G.-J., and Chu B.-T. A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6 3 (2003) 404-441
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.-T.3
-
14
-
-
84947436665
-
-
C. Ruan, V. Varadharajan, Resolving conflicts in authorization delegations, in: Seventh Australian Conference on Information Security and Privacy, Lecture Notes in Computer Science, vol. 2384, Springer, Berlin, 2002, pp.271-285.
-
-
-
-
15
-
-
84865788031
-
A model of oasis role-based access control and its support for active security
-
J. Bacon, K. Moody, and W. Yao. A model of oasis role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. 5 4 (2002) 492-540
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.4
, pp. 492-540
-
-
J. Bacon1
K. Moody2
W. Yao3
-
16
-
-
1642417532
-
-
J.S. Park, Y.L. Lee, H.H. Lee, B.N. Noh, A role-based delegation model using role hierarchy supporting restricted permission inheritance, in: Proceedings of the International Conference on Security and Management, SAM '03, 2003, CSREA Press, pp.294-302.
-
-
-
-
18
-
-
35248894984
-
-
W. Yao, Fidelis: a policy-driven trust management framework, in: Trust management, First International Conference, iTrust, Lecture Notes in Computer Science, vol. 2692, Springer, Berlin, 2003, pp.301-317.
-
-
-
-
21
-
-
0035594917
-
Managing workflow authorization constraints through active database technology
-
Castano S., Casati F., and Fugini M. Managing workflow authorization constraints through active database technology. Inf. Syst. Front. 3 3 (2001)
-
(2001)
Inf. Syst. Front.
, vol.3
, Issue.3
-
-
Castano, S.1
Casati, F.2
Fugini, M.3
-
22
-
-
84949747356
-
-
V. Atluri, W-K. Huang, An authorization model for workflows, in: Proceedings of the Fifth European Symposium on Research in Computer Security, Lecture Notes in Computer Science, vol. 1146, Springer, Berlin, 1996, pp.44-64.
-
-
-
-
23
-
-
0033685030
-
-
V. Atluri, W-K. Huang, A petri net based safety analysis of workflow authorization models, J. Comput. Secur. 8 (2/3) (1999).
-
-
-
-
27
-
-
0039372661
-
Viewing business-process security from different perspectives
-
Herrmann G., and Pernul G. Viewing business-process security from different perspectives. Int. J. Electron. Commer. 3 3 (1999) 89-103
-
(1999)
Int. J. Electron. Commer.
, vol.3
, Issue.3
, pp. 89-103
-
-
Herrmann, G.1
Pernul, G.2
-
29
-
-
33751424000
-
-
J.A. Miller, M. Fan, S. Wu, I.B. Arpinar, A.P. Sheth, K.J. Kochut, Security for the meteor workflow management system, Uga-cs-lsdis Technical Report, University of Georgia, 1999.
-
-
-
-
30
-
-
33751412959
-
-
S. Wu, Task and role combined access control model for workflow system, Uga-lsdis, University of Georgia, 1999.
-
-
-
-
31
-
-
0033650839
-
-
G.-J. Ahn, R. Sandhu, M.H. Kang, J.S. Park, Injecting RBAC to secure a web-based workflow system, in: Fifth ACM Workshop on Role-Based Access Control, Berlin, Germany, July 2000. http://citeseer.nj.nec.com/ahn00injecting.html.
-
-
-
-
33
-
-
33751423258
-
-
V. Atluri, E. Bertino, E. Ferrari, P. Mazzoleni, Supporting delegation in secure workflow management systems, in: IFIP WG 11.3 Conference on Data and Application Security, 2003.
-
-
-
|