-
1
-
-
35048901912
-
Design and implementation of the YAWL system
-
A. Persson and J. Stirna, editors, Proceedings of The 16th International Conference on Advanced Information Systems Engineering CAiSE 04, of, Riga, Latvia, June, Springer Verlag
-
W.M.P. van der Aalst, L. Aldred, M. Dumas, and A.H.M. ter Hofstede. "Design and implementation of the YAWL system." In A. Persson and J. Stirna, editors, Proceedings of The 16th International Conference on Advanced Information Systems Engineering (CAiSE 04), volume 3084 of LNCS, pp. 142-159, Riga, Latvia, June 2004. Springer Verlag.
-
(2004)
LNCS
, vol.3084
, pp. 142-159
-
-
van der Aalst, W.M.P.1
Aldred, L.2
Dumas, M.3
ter Hofstede, A.H.M.4
-
3
-
-
34247131792
-
Adaptive Medical Workflow Management for a Context-Dependent Home Healthcare Assistance Service
-
Elsevier
-
L. Ardissono, A. Di Leva, G. Petrone, M. Segnan, and M. Sonnessa. "Adaptive Medical Workflow Management for a Context-Dependent Home Healthcare Assistance Service." In Electronic Notes in Theoretical Computer Science, Elsevier, 2005.
-
(2005)
Electronic Notes in Theoretical Computer Science
-
-
Ardissono, L.1
Di Leva, A.2
Petrone, G.3
Segnan, M.4
Sonnessa, M.5
-
4
-
-
84949747356
-
An Authorization Model for Workflows
-
Proceedings of the Fifth European Symposium on Research in Computer Security, Rome, Italy, pp, Berlin: Springer-Verlag
-
V. Atluri and W.-K. Huang. "An Authorization Model for Workflows." In Proceedings of the Fifth European Symposium on Research in Computer Security, Rome, Italy, pp. 44-64. Lecture Notes in Computer Science, no. 1146. Berlin: Springer-Verlag.
-
Lecture Notes in Computer Science
, vol.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
7
-
-
3042511452
-
-
S. Chaari, F. Biennier, C. Ben Amar, J. and Favrel. An authorization and access control model for workflow. First International Symposium on Control, Communications and Signal Processing, pp. 141-148, 2004.
-
S. Chaari, F. Biennier, C. Ben Amar, J. and Favrel. "An authorization and access control model for workflow." First International Symposium on Control, Communications and Signal Processing, pp. 141-148, 2004.
-
-
-
-
11
-
-
0034572257
-
Towards a new dimension in clinical information processing
-
P. Dadam, and M. Reichert. "Towards a new dimension in clinical information processing." In Stud. Health Technol. Inform., 77, pp. 295-301, 2000.
-
(2000)
Stud. Health Technol. Inform
, vol.77
, pp. 295-301
-
-
Dadam, P.1
Reichert, M.2
-
12
-
-
0346580272
-
A patient workflow management system built on guidelines
-
L. Dazzi, and M. Stefanelli. "A patient workflow management system built on guidelines." In Proc. of AMIA 97, pp. 146-150, 1997.
-
(1997)
Proc. of AMIA
, vol.97
, pp. 146-150
-
-
Dazzi, L.1
Stefanelli, M.2
-
14
-
-
0033562565
-
Privacy in clinical information systems in secondary care
-
May
-
I. Denley and S. Weston Smith. "Privacy in clinical information systems in secondary care." In British Medical Journal, 318, pp. 1328-1331, May 1999.
-
(1999)
British Medical Journal
, vol.318
, pp. 1328-1331
-
-
Denley, I.1
Weston Smith, S.2
-
16
-
-
33747074188
-
An overview of workflow management: From process modeling to workflow automation infrastructure
-
D. Georgakopoulos, M. Hornick, and A. Sheth. "An overview of workflow management: from process modeling to workflow automation infrastructure." In Distributed Parallel Databases, 3, 2, pp. 119-153, 1995.
-
(1995)
Distributed Parallel Databases
, vol.3
, Issue.2
, pp. 119-153
-
-
Georgakopoulos, D.1
Hornick, M.2
Sheth, A.3
-
22
-
-
39049116565
-
Optimistic security: A new access control paradigm
-
ACM Press, Caledon Hills, Ontario, Canada, ISBN: 1581131496
-
D. Povey. "Optimistic security: a new access control paradigm." In Proceedings of the 1999 workshop on New security paradigms. ACM Press, Caledon Hills, Ontario, Canada, 2000. ISBN: 1581131496.
-
(2000)
Proceedings of the 1999 workshop on New security paradigms
-
-
Povey, D.1
-
23
-
-
0035233022
-
Simulation of a Stroke Unit Careflow
-
S. Quaglini, E. Caffi, A. Cavallini, G. Micieli, and M. Stefanelli. "Simulation of a Stroke Unit Careflow." In Medinfo, 2001.
-
(2001)
Medinfo
-
-
Quaglini, S.1
Caffi, E.2
Cavallini, A.3
Micieli, G.4
Stefanelli, M.5
-
24
-
-
39049126192
-
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
-
Miami, Florida, December
-
L. Røstad and O. Edsberg. "A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs." In Proc. of 22nd Annual Computer Security Applications Conference, Miami, Florida, December, 2006.
-
(2006)
Proc. of 22nd Annual Computer Security Applications Conference
-
-
Røstad, L.1
Edsberg, O.2
-
25
-
-
34748859698
-
Authorisation and Conflict Resolution for Hierarchical Domains
-
June
-
G. Russello, C. Dong, N. Dulay. "Authorisation and Conflict Resolution for Hierarchical Domains." In Proc. of Policy07 June 2007.
-
(2007)
Proc. of Policy07
-
-
Russello, G.1
Dong, C.2
Dulay, N.3
-
26
-
-
0030086382
-
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. In IEEE Computer 29, 2 (Feb.), pp. 38-47, 1996.
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. "Role-based access control models". In IEEE Computer 29, 2 (Feb.), pp. 38-47, 1996.
-
-
-
-
27
-
-
0013420317
-
METEOR Workflow Management System and its use in Prototyping Healthcare Applications
-
Nashville, TN, April
-
A. Sheth, D. Worah, K. Kochut, Z.J. Miller, D. Palaniswami, and S. Das. "METEOR Workflow Management System and its use in Prototyping Healthcare Applications." In Proceedings of the Towards an Electronic Patient Record (TEPR97) Conference, Nashville, TN, April 1997.
-
(1997)
Proceedings of the Towards an Electronic Patient Record (TEPR97) Conference
-
-
Sheth, A.1
Worah, D.2
Kochut, K.3
Miller, Z.J.4
Palaniswami, D.5
Das, S.6
-
28
-
-
0036506787
-
Security and Management Policy Specification
-
March
-
M. Sloman and E. Lupu. "Security and Management Policy Specification." In IEEE Network, pp.10-19, Vol. 16, Issue 2, March, 2002.
-
(2002)
IEEE Network
, vol.16
, Issue.2
, pp. 10-19
-
-
Sloman, M.1
Lupu, E.2
-
29
-
-
84988603769
-
Towards a Task-based Paradigm for Flexible and Adaptable Access Control in Distributed Applications
-
IEEE Press, pp
-
R.K. Thomas and R.S. Sandhu. "Towards a Task-based Paradigm for Flexible and Adaptable Access Control in Distributed Applications." In Proceedings of the Second New Security Paradigms Workshop, IEEE Press, pp. 138-142, 1993.
-
(1993)
Proceedings of the Second New Security Paradigms Workshop
, pp. 138-142
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
31
-
-
50249089343
-
-
R. Thomas and R. Sandhu Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. In Proc. of the IFIP TC11 WG11.3 11th International Conference on Database Securty XI: Status and Prospects, pp. 166-181, 1997.
-
R. Thomas and R. Sandhu "Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management." In Proc. of the IFIP TC11 WG11.3 11th International Conference on Database Securty XI: Status and Prospects, pp. 166-181, 1997.
-
-
-
-
32
-
-
24344501341
-
Access control in collaborative systems
-
W. Tolone, G.-J. Ahn, T. Pai, and S.-P. Hong. "Access control in collaborative systems." In ACM Comput. Surv., 37(1), pp. 29-41, 2005.
-
(2005)
ACM Comput. Surv
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.-J.2
Pai, T.3
Hong, S.-P.4
-
33
-
-
0036161253
-
Authorization and Access Control of Application Data in Workflow Systems
-
S. Wu, A. Sheth, J. Miller, and Z Luo. "Authorization and Access Control of Application Data in Workflow Systems." In Journal of Intelligent Information Systems, 18(1), pp. 71-94, 2002.
-
(2002)
Journal of Intelligent Information Systems
, vol.18
, Issue.1
, pp. 71-94
-
-
Wu, S.1
Sheth, A.2
Miller, J.3
Luo, Z.4
|