메뉴 건너뛰기




Volumn ISAS, Issue , 2006, Pages 181-188

Supporting authentication requirements in workflows

Author keywords

Authorization constraints; Role based access control; Workflow authentication requirements

Indexed keywords

ADDED VALUES; AUTHENTICATION INFORMATION; AUTHORIZATION CONSTRAINTS; AUTHORIZATION DECISION; BUSINESS PROCESS; ROLE-BASED ACCESS CONTROL; ROLE-BASED ACCESS CONTROL MODEL; SENSITIVE DATAS; WORK-FLOWS; WORKFLOW TECHNOLOGY;

EID: 51849118807     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (16)
  • 1
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • Bertino, E., Ferrari, E., and Atluri, V. (1999). The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur., 2(1):65-104.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 3
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • Casati, F., Castano, S., and Fugini, M. (2001). Managing workflow authorization constraints through active database technology. Information Systems Frontiers, 3(3):319-338.
    • (2001) Information Systems Frontiers , vol.3 , Issue.3 , pp. 319-338
    • Casati, F.1    Castano, S.2    Fugini, M.3
  • 4
    • 0032255787 scopus 로고    scopus 로고
    • Enforcing workflow authorization constraints using triggers
    • Casati, F., Castano, S., and Fugini, M. G. (1998). Enforcing workflow authorization constraints using triggers. Journal of Computer Security, 6(4):257-285.
    • (1998) Journal of Computer Security , vol.6 , Issue.4 , pp. 257-285
    • Casati, F.1    Castano, S.2    Fugini, M.G.3
  • 7
    • 77953910235 scopus 로고    scopus 로고
    • INESC Lisboa Software Engineering Group
    • INESC Lisboa Software Engineering Group (2004). WorkSCo: Workflow with Separation of Concerns. http://sourceforge.net/projects/worksco/.
    • (2004) WorkSCo: Workflow with Separation of Concerns
  • 9
    • 0345618751 scopus 로고    scopus 로고
    • Kent, S. T. and Millett, L. I., editors National Academies Press, Washington, DC, USA
    • Kent, S. T. and Millett, L. I., editors (2003). Who goes There? Authentication Through the Lens of Privacy. National Academies Press, Washington, DC, USA.
    • (2003) Who Goes There? Authentication Through the Lens of Privacy
  • 11
    • 11144352941 scopus 로고    scopus 로고
    • Organizational Management in Workflow Applications - Issues and Perspectives
    • Muehlen, M. Z. (2004). Organizational Management in Workflow Applications - Issues and Perspectives. Inf. Tech. and Management, 5(3-4):271-291.
    • (2004) Inf. Tech. and Management , vol.5 , Issue.3-4 , pp. 271-291
    • Muehlen, M.Z.1
  • 15
    • 35048852640 scopus 로고    scopus 로고
    • AT-RBAC: An Authentication Trustworthiness-Based RBAC Model
    • Wuhan, China. Springer-Verlag
    • Wang, L., Wei, L., Liao, X., and Wang, H. (2004). AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. In GCC Workshops, pages 343-350, Wuhan, China. Springer-Verlag.
    • (2004) GCC Workshops , pp. 343-350
    • Wang, L.1    Wei, L.2    Liao, X.3    Wang, H.4
  • 16
    • 18944384049 scopus 로고    scopus 로고
    • Workflow Management Coalition Technical report, Workflow Management Coalition
    • Workflow Management Coalition (1999). Terminology & Glossary. Technical report, Workflow Management Coalition.
    • (1999) Terminology & Glossary


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.