메뉴 건너뛰기




Volumn , Issue , 2008, Pages 10-15

A secure task delegation model for workflows

Author keywords

[No Author keywords available]

Indexed keywords

DATA STRUCTURES; WORK SIMPLIFICATION;

EID: 55849098600     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2008.21     Document Type: Conference Paper
Times cited : (12)

References (17)
  • 1
    • 38149016224 scopus 로고    scopus 로고
    • A framework for evidence lifecycle management
    • Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, Nancy, France, Springer
    • Andreas Schaad. A framework for evidence lifecycle management. InWeb Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, Nancy, France, Lecture Notes in Computer Science, pages 191-200. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , pp. 191-200
    • Schaad, A.1
  • 4
    • 25144499038 scopus 로고    scopus 로고
    • Nick Russell, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, and David Edmond. Workflow resource patterns: Identification, representation and tool support. In Proceedings of the Advanced Information Systems Engineering, 17th International Conference, CAiSE 2005, Porto, Portugal, pages 216-232, 2005.
    • Nick Russell, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, and David Edmond. Workflow resource patterns: Identification, representation and tool support. In Proceedings of the Advanced Information Systems Engineering, 17th International Conference, CAiSE 2005, Porto, Portugal, pages 216-232, 2005.
  • 6
    • 38149050563 scopus 로고    scopus 로고
    • Collaboration for human-centric egovernment workflows
    • Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, Nancy, France, Springer
    • Khaled Gaaloul, François Charoy, Andreas Schaad, and Hannah Lee. Collaboration for human-centric egovernment workflows. In Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, Nancy, France, Lecture Notes in Computer Science, pages 201-212. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , pp. 201-212
    • Gaaloul, K.1    Charoy, F.2    Schaad, A.3    Lee, H.4
  • 7
    • 55849087864 scopus 로고    scopus 로고
    • Workflow Management Coalition. Workflow Management Coalition Terminology and Glossary. Document Number WFMC-TC-1011, February 1999.
    • Workflow Management Coalition. Workflow Management Coalition Terminology and Glossary. Document Number WFMC-TC-1011, February 1999.
  • 8
    • 55849132432 scopus 로고    scopus 로고
    • Web Services Human Task, WS-HumanTask, Version 1.0, June 2007
    • Web Services Human Task. (WS-HumanTask), Version 1.0, June 2007. http://www.active-endpoints.com/documents/documents/1/WS-Human Task-v1.pdf.
  • 9
    • 0010634781 scopus 로고    scopus 로고
    • Reind P. van de Riet, and Ehud Gudes. Specifying application-level security in workflow systems
    • Washington, DC, USA, IEEE Computer Society
    • Martin S. Olivier, Reind P. van de Riet, and Ehud Gudes. Specifying application-level security in workflow systems. In DEXA '98: Proceedings of the 9th International Workshop on Database and Expert.Systems Applications, pages 346-351, Washington, DC, USA, 1998. IEEE Computer Society.
    • (1998) DEXA '98: Proceedings of the 9th International Workshop on Database and Expert.Systems Applications , pp. 346-351
    • Olivier, M.S.1
  • 14
    • 55849100611 scopus 로고    scopus 로고
    • Workflow Management Coalition. Workflow Security Considerations. White Paper, Document Number WFMC-TC-1019, 2001.
    • Workflow Management Coalition. Workflow Security Considerations. White Paper, Document Number WFMC-TC-1019, 2001.
  • 17
    • 33750232667 scopus 로고    scopus 로고
    • Delegation in role-based access control
    • Proceedings of the Computer Security -ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, Springer
    • Jason Crampton and Hemanth Khambhammettu. Delegation in role-based access control. In Proceedings of the Computer Security -ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Lecture Notes in Computer Science, pages 174-191. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , pp. 174-191
    • Crampton, J.1    Khambhammettu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.