-
1
-
-
85036879174
-
-
Agrawal, A, et al, 2007a, Web services human task WS-HumanTask, version 1.0. Retrieved from
-
Agrawal, A., et al. (2007a). Web services human task (WS-HumanTask), version 1.0. Retrieved from http://www.adobe.com/devnet/livecycle/ pdfs/ws\_humantask\_spec.pdf
-
-
-
-
2
-
-
85036886044
-
-
Agrawal, A, et al, 2007b, WS-BPEL extension for people BPEL4People, version 1.0. Retrieved from
-
Agrawal, A., et al. (2007b). WS-BPEL extension for people (BPEL4People), version 1.0. Retrieved from http://www.adobe.com/ devnet/livecycle/pdfs/bpel-4people_spec.pdf
-
-
-
-
3
-
-
0033650839
-
Injecting RBAC to secure a Web-based workflow system
-
Berlin, Germany pp, Retrieved from
-
Ahn, G.-J., Sandhu, R., Kang, M. H., & Park, J. S. (2000). Injecting RBAC to secure a Web-based workflow system. In Proceedings of the Fifth ACM Workshop on Role-Based Access Control, Berlin, Germany (pp. 1-10). Retrieved from http://portal.acm.org/ citation.cfm?doid=344287.344295
-
(2000)
Proceedings of the Fifth ACM Workshop on Role-Based Access Control
, pp. 1-10
-
-
Ahn, G.-J.1
Sandhu, R.2
Kang, M.H.3
Park, J.S.4
-
4
-
-
85036849714
-
-
Anderson, A, 2005, Core and hierarchical role based access control (RBAC) profile of XACML, version 2.0. OASIS. Retrieved from
-
Anderson, A. (2005). Core and hierarchical role based access control (RBAC) profile of XACML, version 2.0. OASIS. Retrieved from http:// docs.oasis-open.org/xacml/2.0/access\_control-xacml-2.0- rbac-profile1-spec-os.pdf
-
-
-
-
5
-
-
84949747356
-
An authorization model for workflows
-
Proceedings of the Fourth European Symposium on Research in Computer Security, Rome, Springer
-
Atluri, V., & Huang, W. (1996). An authorization model for workflows. In Proceedings of the Fourth European Symposium on Research in Computer Security, Rome (LNCS 1146, pp. 44-64). Springer.
-
(1996)
LNCS
, vol.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.2
-
6
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., & Atluri, V. (1999). The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1), 65-104.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
7
-
-
85036869977
-
-
Biron, P., & Malhotra, A. (2004). XML schema part 2: Datatypes. W3C. Retrieved from http://www.w3.org/TR/xmlschema-2
-
Biron, P., & Malhotra, A. (2004). XML schema part 2: Datatypes. W3C. Retrieved from http://www.w3.org/TR/xmlschema-2
-
-
-
-
8
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
Botha, R. A., & Elofi, J. H. P. (2001). Separation of duties for access control enforcement in workflow environments. IBM Systems Journal, 40(3), 666-682.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Elofi, J.H.P.2
-
9
-
-
0035594917
-
Managing workflow authorization constraints through active database technology
-
Casati, F., Castano, S., & Fugini, M. (2001). Managing workflow authorization constraints through active database technology. Information Systems Frontiers, 3(3), 319-338.
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
, pp. 319-338
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
10
-
-
85036877379
-
-
Christensen, E, Curbera, F, Meredith, G, & Weerawarana, S, 2001, Web services description language (WSDL) version 1.1. W3C. Retrieved from
-
Christensen, E., Curbera, F., Meredith, G., & Weerawarana, S. (2001). Web services description language (WSDL) version 1.1. W3C. Retrieved from http://www.w3.org/TR/2001/NOTE-wsdl-20010315
-
-
-
-
11
-
-
85036877497
-
-
Clark, J, & DeRose, S, 1999, XML path language (XPath) version 1.0. W3C. Retrieved from
-
Clark, J., & DeRose, S. (1999). XML path language (XPath) version 1.0. W3C. Retrieved from http://www.w3.org/TR/1999 /REC-xpath-19991116
-
-
-
-
14
-
-
85036858109
-
-
Jordan, D, & Evdemon, J, 2007, Web services business process execution language, version 2.0. OASIS. Retrieved from
-
Jordan, D., & Evdemon, J. (2007). Web services business process execution language, version 2.0. OASIS. Retrieved from http:// docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.pdf
-
-
-
-
15
-
-
3543075807
-
An access control framework for business processes for Web services
-
October, Fairfax, VA pp
-
Koshutanski, H., & Massacci, F. (2003, October). An access control framework for business processes for Web services. In Proceedings of ACM Workshop on XML Security, Fairfax, VA (pp. 15-24).
-
(2003)
Proceedings of ACM Workshop on XML Security
, pp. 15-24
-
-
Koshutanski, H.1
Massacci, F.2
-
16
-
-
0004002694
-
-
IBM Software Group. Retrieved from
-
Leymann, F. (2001). Web services flow language (WSFL 1.0). IBM Software Group. Retrieved from http://www-306.ibm.com/software/solutions/ webservices/pdf/WSFL.pdf
-
(2001)
Web services flow language (WSFL 1.0)
-
-
Leymann, F.1
-
17
-
-
85036905022
-
-
Moses, T, 2005, Extensible access control markup language XACML, version 2.0. OASIS. Retrieved from
-
Moses, T. (2005). Extensible access control markup language (XACML), version 2.0. OASIS. Retrieved from http://docs.oasis-open.org/xacml/ 2.0/access\_control-xacml-2.0-core-spec-os.pdf
-
-
-
-
18
-
-
0002012872
-
Specification and execution of transactional workflows
-
Addison-Wesley
-
Rusinkiewicz, M., & Sheth, A. P. (1995). Specification and execution of transactional workflows. In Modern database systems: The object model, interoperability, and beyond (pp. 592-620). Addison-Wesley.
-
(1995)
Modern database systems: The object model, interoperability, and beyond
, pp. 592-620
-
-
Rusinkiewicz, M.1
Sheth, A.P.2
-
20
-
-
85036901991
-
XML schema part 1
-
Retrieved from
-
Thompson, H. S., Beech, D., Maloney, M., & Mendelsohn, N. (2004). XML schema part 1: Structures. W3C. Retrieved from http:/ /www.w3.org/TR/xmlschema-1
-
(2004)
Structures
-
-
Thompson, H.S.1
Beech, D.2
Maloney, M.3
Mendelsohn, N.4
-
21
-
-
0348209180
-
W-RBAC: A workflow security model incorporating controlled overriding of constraints
-
Wainer, J., Barthelmess, P., & Kumar, A. (2005). W-RBAC: A workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems, 12(4), 455-486.
-
(2005)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-486
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
|