-
1
-
-
38149016224
-
A framework for evidence lifecycle management
-
Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, Nancy, France, Springer
-
Andreas Schaad. A framework for evidence lifecycle management. InWeb Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, Nancy, France, Lecture Notes in Computer Science, pages 191-200. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, pp. 191-200
-
-
Schaad, A.1
-
3
-
-
3042519776
-
An execution model for multilevel seccure workflows
-
London, UK, Chapman & Hall, Ltd
-
Vijayalakshmi Atluri, Wei-Kuang Huang, and Elisa Bertino. An execution model for multilevel seccure workflows. In Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI, pages 151-165, London, UK, 1998. Chapman & Hall, Ltd.
-
(1998)
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI
, pp. 151-165
-
-
Atluri, V.1
Huang, W.-K.2
Bertino, E.3
-
4
-
-
25144499038
-
-
Nick Russell, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, and David Edmond. Workflow resource patterns: Identification, representation and tool support. In Proceedings of the Advanced Information Systems Engineering, 17th International Conference, CAiSE 2005, Porto, Portugal, pages 216-232, 2005.
-
Nick Russell, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, and David Edmond. Workflow resource patterns: Identification, representation and tool support. In Proceedings of the Advanced Information Systems Engineering, 17th International Conference, CAiSE 2005, Porto, Portugal, pages 216-232, 2005.
-
-
-
-
5
-
-
84892711302
-
Framework for role-based delegation models
-
Washington, DC, USA, IEEE Computer Society
-
E. Barka and R. Sandhu. Framework for role-based delegation models. In Proceedings of the 16th Annual Computer Security Applications Conference, pages 168-176, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
Proceedings of the 16th Annual Computer Security Applications Conference
, pp. 168-176
-
-
Barka, E.1
Sandhu, R.2
-
6
-
-
38149050563
-
Collaboration for human-centric egovernment workflows
-
Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, Nancy, France, Springer
-
Khaled Gaaloul, François Charoy, Andreas Schaad, and Hannah Lee. Collaboration for human-centric egovernment workflows. In Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, Nancy, France, Lecture Notes in Computer Science, pages 201-212. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, pp. 201-212
-
-
Gaaloul, K.1
Charoy, F.2
Schaad, A.3
Lee, H.4
-
7
-
-
55849087864
-
-
Workflow Management Coalition. Workflow Management Coalition Terminology and Glossary. Document Number WFMC-TC-1011, February 1999.
-
Workflow Management Coalition. Workflow Management Coalition Terminology and Glossary. Document Number WFMC-TC-1011, February 1999.
-
-
-
-
8
-
-
55849132432
-
-
Web Services Human Task, WS-HumanTask, Version 1.0, June 2007
-
Web Services Human Task. (WS-HumanTask), Version 1.0, June 2007. http://www.active-endpoints.com/documents/documents/1/WS-Human Task-v1.pdf.
-
-
-
-
9
-
-
0010634781
-
Reind P. van de Riet, and Ehud Gudes. Specifying application-level security in workflow systems
-
Washington, DC, USA, IEEE Computer Society
-
Martin S. Olivier, Reind P. van de Riet, and Ehud Gudes. Specifying application-level security in workflow systems. In DEXA '98: Proceedings of the 9th International Workshop on Database and Expert.Systems Applications, pages 346-351, Washington, DC, USA, 1998. IEEE Computer Society.
-
(1998)
DEXA '98: Proceedings of the 9th International Workshop on Database and Expert.Systems Applications
, pp. 346-351
-
-
Olivier, M.S.1
-
10
-
-
49049088760
-
Avoiding Policy-based Deadlocks in Business Processes
-
Barcelona, Spain, IEEE Computer Society
-
Mathias Kohler and Andreas Schaad. Avoiding Policy-based Deadlocks in Business Processes. In Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, pages 709-716, Technical University of Catalonia, Barcelona, Spain, IEEE Computer Society.
-
Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, pages 709-716, Technical University of Catalonia
-
-
Kohler, M.1
Schaad, A.2
-
12
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
Longhua Zhang, Gail-Joon Ahn, and Bei-Tseng Chu. A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security, 6(3):404-441, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.-T.3
-
13
-
-
0002817535
-
The PERMIS X.509 role based privilege management infrastructure
-
June 3-4, Monterey, California, USA, ACM
-
David W. Chadwick and Alexander Otenko. The PERMIS X.509 role based privilege management infrastructure. SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies, June 3-4, 2002, pages 135-140, Monterey, California, USA, ACM.
-
(2002)
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 135-140
-
-
Chadwick, D.W.1
Otenko, A.2
-
14
-
-
55849100611
-
-
Workflow Management Coalition. Workflow Security Considerations. White Paper, Document Number WFMC-TC-1019, 2001.
-
Workflow Management Coalition. Workflow Security Considerations. White Paper, Document Number WFMC-TC-1019, 2001.
-
-
-
-
15
-
-
11244343640
-
Policy Contexts: Controlling Information Flow in Parameterised RBAC
-
Washington, DC, USA, IEEE Computer Society
-
Andreas Belokosztolszki, David M. Eyers, and Ken Moody. Policy Contexts: Controlling Information Flow in Parameterised RBAC. In POLICY '03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, page 99, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
POLICY '03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 99
-
-
Belokosztolszki, A.1
Eyers, D.M.2
Moody, K.3
-
16
-
-
0242540371
-
PBDM: A flexible delegation model in RBAC
-
New York, NY, USA, ACM Press
-
Xinwen Zhang, Sejong Oh, and Ravi Sandhu. PBDM: a flexible delegation model in RBAC. In SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 149-157, New York, NY, USA, 2003. ACM Press.
-
(2003)
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
, pp. 149-157
-
-
Zhang, X.1
Oh, S.2
Sandhu, R.3
-
17
-
-
33750232667
-
Delegation in role-based access control
-
Proceedings of the Computer Security -ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, Springer
-
Jason Crampton and Hemanth Khambhammettu. Delegation in role-based access control. In Proceedings of the Computer Security -ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Lecture Notes in Computer Science, pages 174-191. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, pp. 174-191
-
-
Crampton, J.1
Khambhammettu, H.2
|