메뉴 건너뛰기




Volumn 3269, Issue , 2004, Pages 171-186

A secure workflow model based on distributed constrained role and task assignment for the internet

Author keywords

[No Author keywords available]

Indexed keywords

MANAGERS; WORK SIMPLIFICATION;

EID: 35048849058     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30191-2_14     Document Type: Article
Times cited : (7)

References (16)
  • 3
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Info, and Sys. Security 2 (1999) 65-104
    • (1999) ACM Trans. Info, and Sys. Security , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 5
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • Barker, S., Stuckey, P.J.: Flexible access control policy specification with constraint logic programming. ACM Trans. Info, and Sys. Security 6 (2003) 501-546
    • (2003) ACM Trans. Info, and Sys. Security , vol.6 , pp. 501-546
    • Barker, S.1    Stuckey, P.J.2
  • 7
    • 35048858359 scopus 로고    scopus 로고
    • Towards reuse in agent oriented information systems: The importance of being purposive
    • International workshop on Agent-Oriented Information systems (AOIS-2003) held in conjunction with AAMAS 2003, Springer-Verlag
    • Goss, S., Heinze, C., Papasimeon, M., Pearce, A., Sterling, L.: Towards reuse in agent oriented information systems: the importance of being purposive. In: International workshop on Agent-Oriented Information systems (AOIS-2003) held in conjunction with AAMAS 2003, to appear in Lecture Notes in Computer Science, Springer-Verlag (2003) 30-37
    • (2003) Lecture Notes in Computer Science , pp. 30-37
    • Goss, S.1    Heinze, C.2    Papasimeon, M.3    Pearce, A.4    Sterling, L.5
  • 10
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • Ahn, G.J., Sandhu, R.: Role-based authorization constraints specification. ACM Trans. Info, and Sys. Security 3 (2000) 207-226
    • (2000) ACM Trans. Info, and Sys. Security , vol.3 , pp. 207-226
    • Ahn, G.J.1    Sandhu, R.2
  • 12
    • 84865788031 scopus 로고    scopus 로고
    • A model of oasis role-based access control and its support for active security
    • Yao, W., Moody, K., Bacon, J.: A model of oasis role-based access control and its support for active security. ACM Trans. Info, and Sys. Security 5 (2002) 492-540
    • (2002) ACM Trans. Info, and Sys. Security , vol.5 , pp. 492-540
    • Yao, W.1    Moody, K.2    Bacon, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.