-
1
-
-
84949747356
-
An authorization model for workflows
-
Martella, G, Kurth, H, Montolivo, E, Bertino, E, eds, ESORICS, 1146, pp, Springer, Heidelberg
-
Atluri, V., Huang, W.: An authorization model for workflows. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 96. LNCS, vol. 1146, pp. 44-64. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.96
, pp. 44-64
-
-
Atluri, V.1
Huang, W.2
-
3
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2(1), 65-104 (1999)
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
0023266943
-
A comparision of commercial and military computer security policies
-
IEEE Computer Society Press, Los Alamitos May
-
Clark, D.D., Wilson, D.R.: A comparision of commercial and military computer security policies. In: Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 184-194. IEEE Computer Society Press, Los Alamitos (May 1987)
-
(1987)
Proceedings of the 1987 IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
5
-
-
30644475116
-
A reference monitor for workflow systems with constrained task execution
-
Stockholm, Sweden, pp, ACM Press, New York June
-
Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: SACMAT 2005. Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, pp. 38-47. ACM Press, New York (June 2005)
-
(2005)
SACMAT 2005. Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies
, pp. 38-47
-
-
Crampton, J.1
-
7
-
-
0035790711
-
-
Kang, M.H., Park, J.S., Froscher, J.N.: Access control mechanisms for inter-organizational workflow, pp. 66-74 (2001)
-
(2001)
Access control mechanisms for inter-organizational workflow
, pp. 66-74
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
8
-
-
34547319005
-
Resiliency policies in access control
-
ACM Press, New York November
-
Li, N., Tripunitara, M.V., Wang, Q.: Resiliency policies in access control. In: CCS. Proc. ACM Conference on Computer and Communications Security, ACM Press, New York (November 2006)
-
(2006)
CCS. Proc. ACM Conference on Computer and Communications Security
-
-
Li, N.1
Tripunitara, M.V.2
Wang, Q.3
-
9
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
10
-
-
4944250730
-
The consistency of task-based authorization constraints in workflow systems
-
IEEE Computer Society Press, Los Alamitos
-
Tan, K., Crampton, J., Gunter, C.: The consistency of task-based authorization constraints in workflow systems. In: CSFW. Proceedings of the 17th IEEE Computer Security Foundations Workshop, pp. 155-169. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
CSFW. Proceedings of the 17th IEEE Computer Security Foundations Workshop
, pp. 155-169
-
-
Tan, K.1
Crampton, J.2
Gunter, C.3
-
11
-
-
38049087078
-
Satisfiability and resiliency in workflow systems
-
Technical Report CERIAS-TR-2007-28, Center for Education and Research in Information Assurance and Security, Purdue University
-
Wang, Q., Li, N.: Satisfiability and resiliency in workflow systems. Technical Report CERIAS-TR-2007-28, Center for Education and Research in Information Assurance and Security, Purdue University (2007)
-
(2007)
-
-
Wang, Q.1
Li, N.2
|