-
2
-
-
0033650839
-
Injecting RBAC to secure a web-based workflow system
-
G.-J. Ahn, R. Sandhu, M. Kang, and I. Park. Injecting RBAC to secure a web-based workflow system. In Proceedings of the 5th ACM Workshop on Role-Based Access Control, pages 1-10, 2000.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-based Access Control
, pp. 1-10
-
-
Ahn, G.-J.1
Sandhu, R.2
Kang, M.3
Park, I.4
-
5
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1):65-104, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
6
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
R. Botha and J. Eloff. Separation of duties for access control enforcement in workflow environments. IBM Systems Journal, 40(3):666-681, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 666-681
-
-
Botha, R.1
Eloff, J.2
-
8
-
-
0035594917
-
Managing workflow authorization constraints through active database technology
-
Technical Report HPL-2000-156, Hewlett Packard Laboratories
-
F. Casati, S. Castano, and M. Fugini. Managing workflow authorization constraints through active database technology. Information Systems Frontiers, 3(3):319-338, 2001. Technical Report HPL-2000-156, Hewlett Packard Laboratories.
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
, pp. 319-338
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
9
-
-
0004116989
-
-
MTT Press, 2nd edition
-
T. Cormen, C. Leiserson, R. Rivest, and C. Stein. Introduction to Algorithms. MTT Press, 2nd edition, 2002.
-
(2002)
Introduction to Algorithms
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
Stein, C.4
-
11
-
-
33747074188
-
An overview of workflow management: From process modelling to workflow automation infrastructure
-
D. Georgakopoulos, M. Hornick, and A. Sheth. An overview of workflow management: From process modelling to workflow automation infrastructure. Distributed and Parallel Databases, 3(2):119-153, 1995.
-
(1995)
Distributed and Parallel Databases
, vol.3
, Issue.2
, pp. 119-153
-
-
Georgakopoulos, D.1
Hornick, M.2
Sheth, A.3
-
12
-
-
0031682433
-
On the formal definition of separation-of-duty policies and their composition
-
Oakland, California
-
V. Gligor, S. Gavrila, and D. Ferraiolo. On the formal definition of separation-of-duty policies and their composition. In Proceedings of 1998 IEEE Symposium on Research in Security and Privacy, pages 172-183, Oakland, California, 1998.
-
(1998)
Proceedings of 1998 IEEE Symposium on Research in Security and Privacy
, pp. 172-183
-
-
Gligor, V.1
Gavrila, S.2
Ferraiolo, D.3
-
16
-
-
0030086382
-
Rolebased access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Rolebased access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
18
-
-
0348209180
-
W-RBAC - A workfiow security model incorporating controlled overriding of constraints
-
J. Wainer, P. Barthelmess, and A. Kumar. W-RBAC - A workfiow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information System, 12(4):455-486, 2003.
-
(2003)
International Journal of Cooperative Information System
, vol.12
, Issue.4
, pp. 455-486
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
|