메뉴 건너뛰기




Volumn 4714 LNCS, Issue , 2007, Pages 64-79

Modeling of task-based authorization constraints in BPMN

Author keywords

Business process modeling and analysis; Security in business processes

Indexed keywords

COMPETITIVE INTELLIGENCE; CONSTRAINT THEORY; MATHEMATICAL MODELS; RESOURCE ALLOCATION; SECURITY SYSTEMS;

EID: 38049132539     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75183-0_5     Document Type: Conference Paper
Times cited : (115)

References (30)
  • 1
    • 25144499038 scopus 로고    scopus 로고
    • Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, 3520, Springer, Heidelberg (2005)
    • Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, Springer, Heidelberg (2005)
  • 6
    • 0025099231 scopus 로고
    • Some Conundrums Concerning Separation of Duty
    • Oakland, CA pp
    • Nash, M., Poland, K.: Some Conundrums Concerning Separation of Duty. In: IEEE Symposium on Security and Privacy, Oakland, CA pp. 201-209 (1990)
    • (1990) IEEE Symposium on Security and Privacy , pp. 201-209
    • Nash, M.1    Poland, K.2
  • 8
    • 1542597501 scopus 로고    scopus 로고
    • Security Policy Specification Using a Graphical Approach
    • Technical Report
    • Hoagland, J.A., Pandey, R., Levitt, K.N.: Security Policy Specification Using a Graphical Approach. Technical Report (1998)
    • (1998)
    • Hoagland, J.A.1    Pandey, R.2    Levitt, K.N.3
  • 13
    • 38049156457 scopus 로고    scopus 로고
    • Stephen, A.: White. Using BPMN to Model a BPEL Process. BPTrends (2005)
    • Stephen, A.: White. Using BPMN to Model a BPEL Process. BPTrends (2005)
  • 14
    • 38049144637 scopus 로고    scopus 로고
    • Recker, J, Mendling, J, On the translation between bpmn and bpel: Conceptual mismatch between process modeling languages
    • Recker, J., Mendling, J.: On the translation between bpmn and bpel: Conceptual mismatch between process modeling languages
  • 15
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • Ahn, G., Sandhu, R.: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4), 207-226 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.1    Sandhu, R.2
  • 16
    • 0002841051 scopus 로고    scopus 로고
    • Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management
    • Thomas, R.K., Sandhu, R.S.: Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. In: IFIP Workshop on Database Security, pp. 166-181 (1997)
    • (1997) IFIP Workshop on Database Security , pp. 166-181
    • Thomas, R.K.1    Sandhu, R.S.2
  • 17
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security 2, 65-104 (1999)
    • (1999) ACM Transactions on Information and System Security , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 20
    • 38049115771 scopus 로고    scopus 로고
    • Use of UML and Model Transformations for Workflow Process Definitions
    • Kalnins, A., Vitolins, V.: Use of UML and Model Transformations for Workflow Process Definitions. TECHNIKA 3 (2006)
    • (2006) TECHNIKA , vol.3
    • Kalnins, A.1    Vitolins, V.2
  • 23
    • 0037250078 scopus 로고    scopus 로고
    • Visual Authorization Modeling in Ecommerce Applications
    • Chang, S.K., Polese, G., Cibelli, M., Thomas, R.: Visual Authorization Modeling in Ecommerce Applications. IEEE MultiMedia 10(1), 44-54 (2003)
    • (2003) IEEE MultiMedia , vol.10 , Issue.1 , pp. 44-54
    • Chang, S.K.1    Polese, G.2    Cibelli, M.3    Thomas, R.4
  • 24
    • 38049173504 scopus 로고    scopus 로고
    • Huang, W.-K., Atluri, V.: SecureFlow: A Secure Web-enabled Work ow Management System. In: Proceedings of the fourth ACM workshop on Role-based access control (1999)
    • Huang, W.-K., Atluri, V.: SecureFlow: A Secure Web-enabled Work ow Management System. In: Proceedings of the fourth ACM workshop on Role-based access control (1999)
  • 25
    • 38049166141 scopus 로고    scopus 로고
    • Serenity - System Engineering for Security & Dependability WP A2.D4.1
    • Kostaki, P., Kokolakis, S., Pandolfo, C.: Serenity - System Engineering for Security & Dependability WP A2.D4.1 (2006), http://www.serenity-project. org
    • Kostaki, P.1    Kokolakis, S.2    Pandolfo, C.3
  • 27
    • 38049158199 scopus 로고    scopus 로고
    • Analysis of Delegating Obligations
    • Schaad, A.: An Extended Analysis of Delegating Obligations (2004)
    • (2004) An Extended
    • Schaad, A.1
  • 28
    • 38049169470 scopus 로고    scopus 로고
    • Shapiro, R, Marin, R.N.M, XML Process Definition Language Version 2.0. Workflow Management Coalition 2005
    • Shapiro, R., Marin, R.N.M.: XML Process Definition Language Version 2.0. Workflow Management Coalition (2005)
  • 30
    • 38049171028 scopus 로고    scopus 로고
    • Moses, T, eXtensible Access Control Markup Language Version 2.0. OASIS Standard 2005
    • Moses, T.: eXtensible Access Control Markup Language Version 2.0. OASIS Standard (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.