-
1
-
-
51849096843
-
-
Workflow security consideration - white paper. In Workflow Management Coalition, February 1998. WFMC-TC-1019.
-
Workflow security consideration - white paper. In Workflow Management Coalition, February 1998. WFMC-TC-1019.
-
-
-
-
2
-
-
0033650839
-
Injecting RBAC to secure a web-based workflow system
-
G. Ahn, R. Sandhu, M. Kang, and J. Park. Injecting RBAC to secure a web-based workflow system. In Proc. of the fifth ACM Workshop on RBAC, pages 1-10, 2000.
-
(2000)
Proc. of the fifth ACM Workshop on RBAC
, pp. 1-10
-
-
Ahn, G.1
Sandhu, R.2
Kang, M.3
Park, J.4
-
5
-
-
0033887763
-
A semantic-based execution model for multilevel secure workflows
-
V. Atluri, W. Huang, and E. Bertino. A semantic-based execution model for multilevel secure workflows. Journal of Computer Security, 8(1), 2000.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.1
-
-
Atluri, V.1
Huang, W.2
Bertino, E.3
-
7
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur., 2(1):65-104, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
9
-
-
24344453002
-
Lineage retrieval for scientific data processing: A survey
-
R. Bose and J. Frew. Lineage retrieval for scientific data processing: a survey. ACM Comput. Surv., 37(1):1-28, 2005.
-
(2005)
ACM Comput. Surv
, vol.37
, Issue.1
, pp. 1-28
-
-
Bose, R.1
Frew, J.2
-
11
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
R. A. Botha and J. H. P. Eloff. Separation of duties for access control enforcement in workflow environments. End-to-end Security, 40(3), 2001.
-
(2001)
End-to-end Security
, vol.40
, Issue.3
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
12
-
-
33750035572
-
A security model for provenance
-
Technical Report TR-04-06, Harvard University
-
U. Braun and A. Shinna. A security model for provenance. Technical Report TR-04-06, Harvard University, 2006.
-
(2006)
-
-
Braun, U.1
Shinna, A.2
-
13
-
-
44949115921
-
Storing and querying scientific workflow provenance metadata using an RDBMS
-
A. Chebotko, X. Fei, C. Lin, S. Lu, and F. Fotouhi. Storing and querying scientific workflow provenance metadata using an RDBMS. In Proc. of the IEEE International Workshop on Scientific Workflows and Business Workflow Standards in e-Science, pages 611-618, 2007.
-
(2007)
Proc. of the IEEE International Workshop on Scientific Workflows and Business Workflow Standards in e-Science
, pp. 611-618
-
-
Chebotko, A.1
Fei, X.2
Lin, C.3
Lu, S.4
Fotouhi, F.5
-
14
-
-
33747510016
-
Refactoring service-based systems: How to avoid trusting a workflow service
-
H. Chivers and J. McDermid. Refactoring service-based systems: how to avoid trusting a workflow service. Concurr. Comput.: Pract. Exper., 18(10):1255-1275, 2006.
-
(2006)
Concurr. Comput.: Pract. Exper
, vol.18
, Issue.10
, pp. 1255-1275
-
-
Chivers, H.1
McDermid, J.2
-
15
-
-
33646054835
-
Programming scientific and distributed workflow with Triana services
-
D. Churches, G. Gombas, A. Harrison, J. Maassen, C. Robinson, M. Shields, I. Taylor, and I. Wang. Programming scientific and distributed workflow with Triana services. Concurrency and Computation: Practice and Experience, 18(10):1021-1037, 2006.
-
(2006)
Concurrency and Computation: Practice and Experience
, vol.18
, Issue.10
, pp. 1021-1037
-
-
Churches, D.1
Gombas, G.2
Harrison, A.3
Maassen, J.4
Robinson, C.5
Shields, M.6
Taylor, I.7
Wang, I.8
-
17
-
-
0032664448
-
Modeling and analysis of interactions in virtual enterprises
-
H. Davulcu, M. Kifer, L. Pokorny, C. Ramakrishnan, I. Ramakrishnan, and S. Dawson. Modeling and analysis of interactions in virtual enterprises. In Proc. of the Ninth Int. Workshop on Research Issues on Data Engineering, 1999.
-
(1999)
Proc. of the Ninth Int. Workshop on Research Issues on Data Engineering
-
-
Davulcu, H.1
Kifer, M.2
Pokorny, L.3
Ramakrishnan, C.4
Ramakrishnan, I.5
Dawson, S.6
-
18
-
-
29644434815
-
Pegasus: A framework for mapping complex scientific workflows onto distributed systems
-
E. Deelman, G. Singh, M.-H. Su, J. Blythe, Y. Gil, C. Kesselman, G. Mehta, K. Vahi, G. B. Berriman, J. Good, A. Laity, J. C. Jacob, and D. S. Katz. Pegasus: a framework for mapping complex scientific workflows onto distributed systems. Scientific Programming J., 13(3):219-237, 2005.
-
(2005)
Scientific Programming J
, vol.13
, Issue.3
, pp. 219-237
-
-
Deelman, E.1
Singh, G.2
Su, M.-H.3
Blythe, J.4
Gil, Y.5
Kesselman, C.6
Mehta, G.7
Vahi, K.8
Berriman, G.B.9
Good, J.10
Laity, A.11
Jacob, J.C.12
Katz, D.S.13
-
20
-
-
84948706138
-
Chimera: A virtual data system for representing, querying, and automating data derivation
-
I. Foster, J. Vöckler, M. Wilde, and Y. Zhao. Chimera: A virtual data system for representing, querying, and automating data derivation. In Proc. of the Int. Conf. on Scientific and Statistical Database Management (SSDBM), 2002.
-
(2002)
Proc. of the Int. Conf. on Scientific and Statistical Database Management (SSDBM)
-
-
Foster, I.1
Vöckler, J.2
Wilde, M.3
Zhao, Y.4
-
21
-
-
33750091709
-
Managing rapidly-evolving scientific workflows
-
J. Freire, C. T. Silva, S. P. Callahan, E. Santos, C. E. Scheidegger, and H. T. Vo. Managing rapidly-evolving scientific workflows. In Proc. of the International Provenance and Annotation Workshop (IPAW), 2006.
-
(2006)
Proc. of the International Provenance and Annotation Workshop (IPAW)
-
-
Freire, J.1
Silva, C.T.2
Callahan, S.P.3
Santos, E.4
Scheidegger, C.E.5
Vo, H.T.6
-
22
-
-
0033329699
-
Modelling, specifying and implementing workflow security in cyberspace
-
E. Gudes, M. Olivier, and R. Riet. Modelling, specifying and implementing workflow security in cyberspace. Journal of Computer Security, 7(4):287-315, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.4
, pp. 287-315
-
-
Gudes, E.1
Olivier, M.2
Riet, R.3
-
30
-
-
33646040949
-
Scientific workflow management and the Kepler system
-
B. Ludascher, I. Altintas, C. Berkley, D. Higgins, E. Jaeger, M. Jones, E. A. Lee, J. Tao, and Y. Zhao. Scientific workflow management and the Kepler system. Concurr. Comput.: Pract. Exper., 18(10):1039-1065, 2006.
-
(2006)
Concurr. Comput.: Pract. Exper
, vol.18
, Issue.10
, pp. 1039-1065
-
-
Ludascher, B.1
Altintas, I.2
Berkley, C.3
Higgins, D.4
Jaeger, E.5
Jones, M.6
Lee, E.A.7
Tao, J.8
Zhao, Y.9
-
33
-
-
85142139500
-
-
T. M. Oinn, M. Addis, J. Ferris, D. Marvin, M. Senger, R. M. Greenwood, T. Carver, K. Glover, M. R. Pocock, A. Wipat, and P. Li. Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(17):3045-3054, 2004.
-
T. M. Oinn, M. Addis, J. Ferris, D. Marvin, M. Senger, R. M. Greenwood, T. Carver, K. Glover, M. R. Pocock, A. Wipat, and P. Li. Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(17):3045-3054, 2004.
-
-
-
-
35
-
-
0030086382
-
Rolebased access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Rolebased access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
36
-
-
31444456909
-
A survey of data provenance in e-science
-
Y. Simmhan, B. Plale, and D. Gannon. A survey of data provenance in e-science. SIGMOD Rec., 34(3):31-36, 2005.
-
(2005)
SIGMOD Rec
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.1
Plale, B.2
Gannon, D.3
-
37
-
-
34547521213
-
Security issues in a SOA-based provenance system
-
V. Tan, P. Groth, S. Miles, S. Jiang, S. Munroe, S. Tsasakou, and L. Moreau. Security issues in a SOA-based provenance system. In Proc. of the third Int. Provenance and Annotation Workshop (IPAW), 2006.
-
(2006)
Proc. of the third Int. Provenance and Annotation Workshop (IPAW)
-
-
Tan, V.1
Groth, P.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Tsasakou, S.6
Moreau, L.7
-
38
-
-
0348209180
-
-
J. Wainer, P. Barthelmess, and A. Kumar. W_RBAC - a workflow security model incorporating controlled overriding of constraints. Int. J. Cooperative Inf. Syst., 12(4):455-485, 2003.
-
J. Wainer, P. Barthelmess, and A. Kumar. W_RBAC - a workflow security model incorporating controlled overriding of constraints. Int. J. Cooperative Inf. Syst., 12(4):455-485, 2003.
-
-
-
-
40
-
-
0036161253
-
Authorization and access control of application data in workflow systems
-
S. Wu, A. Sheth, J. Miller, and Z. Luo. Authorization and access control of application data in workflow systems. Journal of Intelligent Information Systems, 18(1):71-94, 2002.
-
(2002)
Journal of Intelligent Information Systems
, vol.18
, Issue.1
, pp. 71-94
-
-
Wu, S.1
Sheth, A.2
Miller, J.3
Luo, Z.4
-
41
-
-
77950513266
-
Swift: Fast, reliable, loosely coupled parallel computation
-
Y. Zhao, M. Hategan, B. Clifford, I. Foster, G. von Laszewski, I. Raicu, T. Stef-Praun, and M. Wilde. Swift: Fast, reliable, loosely coupled parallel computation. In Proc. of the Int. Workshop on Scientific Workflows (SWF), 2007.
-
(2007)
Proc. of the Int. Workshop on Scientific Workflows (SWF)
-
-
Zhao, Y.1
Hategan, M.2
Clifford, B.3
Foster, I.4
von Laszewski, G.5
Raicu, I.6
Stef-Praun, T.7
Wilde, M.8
|