-
1
-
-
0002719897
-
The application of petri nets to workflow management
-
AALST, W. 1998. The application of petri nets to workflow management. J. Circ. Syst. Comput. 8, 1, 21-66.
-
(1998)
J. Circ. Syst. Comput.
, vol.8
, Issue.1
, pp. 21-66
-
-
Aalst, W.1
-
2
-
-
84992227458
-
A proposed standard for role-based access control
-
FERRAIOLO, D. F., SANDHU, R., GAVRILA, S., KUHN, D. R., AND CHANDRAMOULI, R. 2001. A proposed standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 3 (Aug.), 224-274.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3 AUG.
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
3
-
-
0018780030
-
The analysis of distributed systems by means of predicate/transition-nets
-
G. Kahn, ed. Lecture Notes in Computer Science, Springer Verlag, Berlin, Heidelberg, New York
-
GENRICH, H. J. AND LAUTENBACH, K. 1979. The analysis of distributed systems by means of predicate/transition-nets. In Semantic of Concurrent Computation, G. Kahn, ed. Lecture Notes in Computer Science, vol. 70. Springer Verlag, Berlin, Heidelberg, New York, 123-146.
-
(1979)
Semantic of Concurrent Computation
, vol.70
, pp. 123-146
-
-
Genrich, H.J.1
Lautenbach, K.2
-
4
-
-
0026103655
-
A unified high-level petri net model for time-critical systems
-
GHEZZI, C., MANDRIOLI, D., MORASCA, S., AND PEZZÈ, M. 1991. A unified high-level petri net model for time-critical systems. IEEE Trans. Softw. Eng. 17, 2 (Feb.), 160-172.
-
(1991)
IEEE Trans. Softw. Eng.
, vol.17
, Issue.2 FEB.
, pp. 160-172
-
-
Ghezzi, C.1
Mandrioli, D.2
Morasca, S.3
Pezzè, M.4
-
5
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA
-
JAJODIA, S., SAMARATI, P., AND SUBRAHMANIAN, V. S. 1997a. A logical language for expressing authorizations, In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA. 31-42.
-
(1997)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
6
-
-
0031162048
-
A unified framework for enforcing multiple access control policies security
-
SIGMOD Record, ACM Press, New York
-
JAJODIA, S., SAMARATI, P., SUBRAHMANIAN, V. S., AND BERTINO, E. 1997b. A unified framework for enforcing multiple access control policies security. In Proceedings of the ACM SIGMOD International Conference on Management of Data. SIGMOD Record, vol. 26, 2. ACM Press, New York, 474-485.
-
(1997)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, vol.26
, Issue.2
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
7
-
-
0242625194
-
Role mining - Revealing business roles for security administration using data mining technology
-
ACM Press, Como, Italy
-
KUHLMANN, M., SHOHAT, D., AND SCHIMPF, G. 2003. Role mining - revealing business roles for security administration using data mining technology. In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies. ACM Press, Como, Italy, 179-186.
-
(2003)
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
9
-
-
0242491000
-
A model for role administration using organization structure
-
R. Sandhu and E. Bertino, eds. ACM SIGSAC, ACM Press, Monterey, CA, USA
-
OH, S. AND SANDHU, R. 2002. A model for role administration using organization structure. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), R. Sandhu and E. Bertino, eds. ACM SIGSAC, ACM Press, Monterey, CA, USA, 155-162.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 155-162
-
-
Oh, S.1
Sandhu, R.2
-
10
-
-
0033651730
-
Modeling users in role-based access control
-
K. Rebensburg, C. Youman, and V. Atluri, eds. ACM SIGSAC, ACM Press, Berlin, Germany
-
OSBORN, S. AND GUO, Y. 2000. Modeling users in role-based access control. In Proceedings of the 5th ACM Workshop on Role-Based Access Control, K. Rebensburg, C. Youman, and V. Atluri, eds. ACM SIGSAC, ACM Press, Berlin, Germany, 31-38.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-based Access Control
, pp. 31-38
-
-
Osborn, S.1
Guo, Y.2
-
11
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
SANDHU, R., BHAMIDIPATI, V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.), 105-135.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1 FEB.
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
13
-
-
0242404016
-
Analyzing program solutions of coordination problems by cpnets
-
A. Mazurkiewicz, ed. Lecture Notes in Computer Science, Springer Verlag, Zakopane, Poland
-
SCHIFFERS, M. AND WEDDE, H. 1978. Analyzing program solutions of coordination problems by cpnets. In Proceedings of the 7th Symposium on Mathematical Foundations of Computer Science, A. Mazurkiewicz, ed. Lecture Notes in Computer Science, vol. 64. Springer Verlag, Zakopane, Poland, 416-422.
-
(1978)
Proceedings of the 7th Symposium on Mathematical Foundations of Computer Science
, vol.64
, pp. 416-422
-
-
Schiffers, M.1
Wedde, H.2
-
14
-
-
0242655853
-
Infinitive behaviour of petri nets
-
VALK, R. 1983. Infinitive behaviour of petri nets. Theo. Comput. Sci. 25, 311-341.
-
(1983)
Theo. Comput. Sci.
, vol.25
, pp. 311-341
-
-
Valk, R.1
-
15
-
-
0035790746
-
Modular authorization
-
R. Sandhu and T. Jaeger, eds. ACM SIGSAC, ACM Press, Chantilly, Virginia
-
WEDDE, H. F. AND LISCHKA, M. 2001. Modular authorization. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT), R. Sandhu and T. Jaeger, eds. ACM SIGSAC, ACM Press, Chantilly, Virginia, 97-105.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 97-105
-
-
Wedde, H.F.1
Lischka, M.2
-
16
-
-
4143062615
-
Composing heterogenous access policies between organizations
-
International Association for Development of the Information Society, Lisbon/Portuagal
-
WEDDE, H. F. AND LISCHKA, M. 2003a. Composing heterogenous access policies between organizations. In Proceedings of the IADIS International Conference e-Society 2003. International Association for Development of the Information Society, Lisbon/Portuagal.
-
(2003)
Proceedings of the IADIS International Conference E-Society 2003
-
-
Wedde, H.F.1
Lischka, M.2
-
17
-
-
0242625205
-
Cooperative role-based administration
-
E. Ferrari and D. Ferraiolo, eds. ACM SIGSAC, ACM Press, Como, Italy
-
WEDDE, H. F. AND LISCHKA, M. 2003b. Cooperative role-based administration. In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT), E. Ferrari and D. Ferraiolo, eds. ACM SIGSAC, ACM Press, Como, Italy.
-
(2003)
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Wedde, H.F.1
Lischka, M.2
-
18
-
-
4143110148
-
Role-based access control in ambient and remote space
-
T. Jaeger and E. Ferrari, eds. ACM SIGSAC, ACM Press, Yorktown Heights, NY
-
WEDDE, H. F. AND LISCHKA, M. 2004. Role-based access control in ambient and remote space. In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies (SACMAT), T. Jaeger and E. Ferrari, eds. ACM SIGSAC, ACM Press, Yorktown Heights, NY.
-
(2004)
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Wedde, H.F.1
Lischka, M.2
|