메뉴 건너뛰기




Volumn 4832 LNCS, Issue , 2007, Pages 142-153

Deriving XACML policies from business process models

Author keywords

Enforcement; eXtensible access control markup language; Integration; Policy definition; Separation of duties business process modeling

Indexed keywords

ACCESS CONTROL; DECISION THEORY; INTEGRATION; MATHEMATICAL MODELS; METADATA; SECURITY SYSTEMS;

EID: 38149139426     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77010-7_15     Document Type: Conference Paper
Times cited : (27)

References (23)
  • 2
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • Tolone, W., Ahn, G.-J., Pai, T., Hong, S.-P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29-41 (2005)
    • (2005) ACM Comput. Surv , vol.37 , Issue.1 , pp. 29-41
    • Tolone, W.1    Ahn, G.-J.2    Pai, T.3    Hong, S.-P.4
  • 5
    • 38149068576 scopus 로고    scopus 로고
    • Anderson, A.: Core and hierarchical role based access control (RBAC) profile of XACML v2.0. OASIS Standard (2005)
    • Anderson, A.: Core and hierarchical role based access control (RBAC) profile of XACML v2.0. OASIS Standard (2005)
  • 8
    • 38349016157 scopus 로고    scopus 로고
    • Formal Semantics and Automated Analysis of BPMN Process Models
    • Dijkman, R.M., Dumas, M., Ouyang, C.: Formal Semantics and Automated Analysis of BPMN Process Models. In: ePrints Archive (2006)
    • (2006) ePrints Archive
    • Dijkman, R.M.1    Dumas, M.2    Ouyang, C.3
  • 15
    • 1542597501 scopus 로고    scopus 로고
    • Security Policy Specification Using a Graphical Approach
    • CSE-98-3. The University of California, Davis Department of Computer Science
    • Hoagland, J.A., Pandey, R., Levitt, K.N.: Security Policy Specification Using a Graphical Approach. In Technical report CSE-98-3. The University of California, Davis Department of Computer Science (1998)
    • (1998) In Technical report
    • Hoagland, J.A.1    Pandey, R.2    Levitt, K.N.3
  • 19
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security 2, 65-104 (1999)
    • (1999) ACM Transactions on Information and System Security , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 21
    • 38149033955 scopus 로고    scopus 로고
    • Ouyang, C., van der Aalst, W.M.P., Marlon, D., ter Hofstede, Arthur, H.M.: Translating BPMN to BPEL. In: BPM Center Report BPM-06-02 (2006)
    • Ouyang, C., van der Aalst, W.M.P., Marlon, D., ter Hofstede, Arthur, H.M.: Translating BPMN to BPEL. In: BPM Center Report BPM-06-02 (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.