-
1
-
-
25144499038
-
-
Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, 3520, Springer, Heidelberg (2005)
-
Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, Springer, Heidelberg (2005)
-
-
-
-
2
-
-
55849112335
-
On the Suitability of BPMN for Business Process Modelling
-
Wohed, P., van der Aalst, W.M.P., Dumas, M., ter Hofstede, A.H.M., Russell, N.: On the Suitability of BPMN for Business Process Modelling. In: Proceedings of the 4th International Conference on Business Process Management (BPM) (2006)
-
(2006)
Proceedings of the 4th International Conference on Business Process Management (BPM)
-
-
Wohed, P.1
van der Aalst, W.M.P.2
Dumas, M.3
ter Hofstede, A.H.M.4
Russell, N.5
-
6
-
-
0025099231
-
Some Conundrums Concerning Separation of Duty
-
Oakland, CA pp
-
Nash, M., Poland, K.: Some Conundrums Concerning Separation of Duty. In: IEEE Symposium on Security and Privacy, Oakland, CA pp. 201-209 (1990)
-
(1990)
IEEE Symposium on Security and Privacy
, pp. 201-209
-
-
Nash, M.1
Poland, K.2
-
8
-
-
1542597501
-
Security Policy Specification Using a Graphical Approach
-
Technical Report
-
Hoagland, J.A., Pandey, R., Levitt, K.N.: Security Policy Specification Using a Graphical Approach. Technical Report (1998)
-
(1998)
-
-
Hoagland, J.A.1
Pandey, R.2
Levitt, K.N.3
-
11
-
-
33746354903
-
-
Kloppmann, M., Koenig, D., Leymann, F., Pfau, G., Rickayzen, A., von Riegen, C., Schmidt, P., Trickovic, I.: WS-BPEL Extension for People - BPEL4People (2005)
-
(2005)
WS-BPEL Extension for People - BPEL4People
-
-
Kloppmann, M.1
Koenig, D.2
Leymann, F.3
Pfau, G.4
Rickayzen, A.5
von Riegen, C.6
Schmidt, P.7
Trickovic, I.8
-
13
-
-
38049156457
-
-
Stephen, A.: White. Using BPMN to Model a BPEL Process. BPTrends (2005)
-
Stephen, A.: White. Using BPMN to Model a BPEL Process. BPTrends (2005)
-
-
-
-
14
-
-
38049144637
-
-
Recker, J, Mendling, J, On the translation between bpmn and bpel: Conceptual mismatch between process modeling languages
-
Recker, J., Mendling, J.: On the translation between bpmn and bpel: Conceptual mismatch between process modeling languages
-
-
-
-
15
-
-
84956993736
-
Role-based authorization constraints specification
-
Ahn, G., Sandhu, R.: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4), 207-226 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.1
Sandhu, R.2
-
16
-
-
0002841051
-
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management
-
Thomas, R.K., Sandhu, R.S.: Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. In: IFIP Workshop on Database Security, pp. 166-181 (1997)
-
(1997)
IFIP Workshop on Database Security
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
17
-
-
0002848811
-
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security 2, 65-104 (1999)
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
20
-
-
38049115771
-
Use of UML and Model Transformations for Workflow Process Definitions
-
Kalnins, A., Vitolins, V.: Use of UML and Model Transformations for Workflow Process Definitions. TECHNIKA 3 (2006)
-
(2006)
TECHNIKA
, vol.3
-
-
Kalnins, A.1
Vitolins, V.2
-
22
-
-
0242625201
-
Model Driven Security for Process-Oriented Systems
-
Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security for Process-Oriented Systems. In: SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 100-109 (2003)
-
(2003)
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
23
-
-
0037250078
-
Visual Authorization Modeling in Ecommerce Applications
-
Chang, S.K., Polese, G., Cibelli, M., Thomas, R.: Visual Authorization Modeling in Ecommerce Applications. IEEE MultiMedia 10(1), 44-54 (2003)
-
(2003)
IEEE MultiMedia
, vol.10
, Issue.1
, pp. 44-54
-
-
Chang, S.K.1
Polese, G.2
Cibelli, M.3
Thomas, R.4
-
24
-
-
38049173504
-
-
Huang, W.-K., Atluri, V.: SecureFlow: A Secure Web-enabled Work ow Management System. In: Proceedings of the fourth ACM workshop on Role-based access control (1999)
-
Huang, W.-K., Atluri, V.: SecureFlow: A Secure Web-enabled Work ow Management System. In: Proceedings of the fourth ACM workshop on Role-based access control (1999)
-
-
-
-
25
-
-
38049166141
-
Serenity - System Engineering for Security & Dependability WP A2.D4.1
-
Kostaki, P., Kokolakis, S., Pandolfo, C.: Serenity - System Engineering for Security & Dependability WP A2.D4.1 (2006), http://www.serenity-project. org
-
-
-
Kostaki, P.1
Kokolakis, S.2
Pandolfo, C.3
-
27
-
-
38049158199
-
-
Analysis of Delegating Obligations
-
Schaad, A.: An Extended Analysis of Delegating Obligations (2004)
-
(2004)
An Extended
-
-
Schaad, A.1
-
28
-
-
38049169470
-
-
Shapiro, R, Marin, R.N.M, XML Process Definition Language Version 2.0. Workflow Management Coalition 2005
-
Shapiro, R., Marin, R.N.M.: XML Process Definition Language Version 2.0. Workflow Management Coalition (2005)
-
-
-
-
29
-
-
0344990694
-
-
Addison Wesley, Reading
-
Kleppe, A., Warmer, J., Bast, W.: MDA Explained: The Model Driven Architecture: Practice and Promise. Addison Wesley, Reading (2003)
-
(2003)
MDA Explained: The Model Driven Architecture: Practice and Promise
-
-
Kleppe, A.1
Warmer, J.2
Bast, W.3
-
30
-
-
38049171028
-
-
Moses, T, eXtensible Access Control Markup Language Version 2.0. OASIS Standard 2005
-
Moses, T.: eXtensible Access Control Markup Language Version 2.0. OASIS Standard (2005)
-
-
-
|