-
1
-
-
0002848811
-
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
Bertino, E., Ferrari, E., and Atluri, V. (1999). The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur., 2(1):65-104.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
3
-
-
0035594917
-
Managing workflow authorization constraints through active database technology
-
Casati, F., Castano, S., and Fugini, M. (2001). Managing workflow authorization constraints through active database technology. Information Systems Frontiers, 3(3):319-338.
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
, pp. 319-338
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
4
-
-
0032255787
-
Enforcing workflow authorization constraints using triggers
-
Casati, F., Castano, S., and Fugini, M. G. (1998). Enforcing workflow authorization constraints using triggers. Journal of Computer Security, 6(4):257-285.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.4
, pp. 257-285
-
-
Casati, F.1
Castano, S.2
Fugini, M.G.3
-
5
-
-
84992227458
-
Proposed NIST Standard for Role-based Access Control
-
Ferraiolo, D. F., Sandhu, R. S., Gavrila, S. I., Kuhn, D. R., and Chandramouli, R. (2001). Proposed NIST Standard for Role-based Access Control. Information and System Security, 4(3):224-274.
-
(2001)
Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Kuhn, D.R.4
Chandramouli, R.5
-
6
-
-
9544223971
-
A secure workflow model
-
Darlinghurst, Australia, Australia. Australian Computer Society, Inc.
-
Hung, P. C. K. and Karlapalem, K. (2003). A secure workflow model. In CRPITS '03: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, pages 33-41, Darlinghurst, Australia, Australia. Australian Computer Society, Inc.
-
(2003)
CRPITS '03: Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003
, pp. 33-41
-
-
Hung, P.C.K.1
Karlapalem, K.2
-
7
-
-
77953910235
-
-
INESC Lisboa Software Engineering Group
-
INESC Lisboa Software Engineering Group (2004). WorkSCo: Workflow with Separation of Concerns. http://sourceforge.net/projects/worksco/.
-
(2004)
WorkSCo: Workflow with Separation of Concerns
-
-
-
8
-
-
30644466528
-
Secure Role-Based Workflow Models
-
Niagara, Ontario, Canada. Kluwer Academic Publishers
-
Kandala, S. and Sandhu, R. (2002). Secure Role-Based Workflow Models. In DAS'01: Proceedings of the fifteenth Annual Working Conference on Database and Application Security, pages 45-58, Niagara, Ontario, Canada. Kluwer Academic Publishers.
-
(2002)
DAS'01: Proceedings of the Fifteenth Annual Working Conference on Database and Application Security
, pp. 45-58
-
-
Kandala, S.1
Sandhu, R.2
-
9
-
-
0345618751
-
-
Kent, S. T. and Millett, L. I., editors National Academies Press, Washington, DC, USA
-
Kent, S. T. and Millett, L. I., editors (2003). Who goes There? Authentication Through the Lens of Privacy. National Academies Press, Washington, DC, USA.
-
(2003)
Who Goes There? Authentication Through the Lens of Privacy
-
-
-
10
-
-
35048849058
-
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet
-
Malaga, Spain. Springer-Verlag
-
Moodahi, I., Gudes, E., Lavee, O., and Meisels, A. (2004). A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. In ICICS'04: Proceedings of the sixth International Conference on Information and Communications Security, pages 171-186, Malaga, Spain. Springer-Verlag.
-
(2004)
ICICS'04: Proceedings of the Sixth International Conference on Information and Communications Security
, pp. 171-186
-
-
Moodahi, I.1
Gudes, E.2
Lavee, O.3
Meisels, A.4
-
11
-
-
11144352941
-
Organizational Management in Workflow Applications - Issues and Perspectives
-
Muehlen, M. Z. (2004). Organizational Management in Workflow Applications - Issues and Perspectives. Inf. Tech. and Management, 5(3-4):271-291.
-
(2004)
Inf. Tech. and Management
, vol.5
, Issue.3-4
, pp. 271-291
-
-
Muehlen, M.Z.1
-
13
-
-
84964853055
-
Access Control: Policies, Models, and Mechanisms
-
Bertinoro, Italy. Springer-Verlag
-
Samarati, P. and di Vimercati, S. D. C. (2000). Access Control: Policies, Models, and Mechanisms. In FOSAD '00: Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, pages 137-196, Bertinoro, Italy. Springer-Verlag.
-
(2000)
FOSAD '00: Revised Versions of Lectures Given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design
, pp. 137-196
-
-
Samarati, P.1
Di Vimercati, S.D.C.2
-
15
-
-
35048852640
-
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model
-
Wuhan, China. Springer-Verlag
-
Wang, L., Wei, L., Liao, X., and Wang, H. (2004). AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. In GCC Workshops, pages 343-350, Wuhan, China. Springer-Verlag.
-
(2004)
GCC Workshops
, pp. 343-350
-
-
Wang, L.1
Wei, L.2
Liao, X.3
Wang, H.4
-
16
-
-
18944384049
-
-
Workflow Management Coalition Technical report, Workflow Management Coalition
-
Workflow Management Coalition (1999). Terminology & Glossary. Technical report, Workflow Management Coalition.
-
(1999)
Terminology & Glossary
-
-
|