메뉴 건너뛰기




Volumn 5, Issue 3, 2008, Pages 20-43

An access-control framework for WS-BPEL

Author keywords

Activity; Authorization constraints; Business process; Permission; Role

Indexed keywords

SPECIFICATIONS; THERMODYNAMIC PROPERTIES; WEB SERVICES;

EID: 55949114432     PISSN: 15457362     EISSN: 15465004     Source Type: Journal    
DOI: 10.4018/jwsr.2008070102     Document Type: Article
Times cited : (44)

References (21)
  • 1
    • 85036879174 scopus 로고    scopus 로고
    • Agrawal, A, et al, 2007a, Web services human task WS-HumanTask, version 1.0. Retrieved from
    • Agrawal, A., et al. (2007a). Web services human task (WS-HumanTask), version 1.0. Retrieved from http://www.adobe.com/devnet/livecycle/ pdfs/ws\_humantask\_spec.pdf
  • 2
    • 85036886044 scopus 로고    scopus 로고
    • Agrawal, A, et al, 2007b, WS-BPEL extension for people BPEL4People, version 1.0. Retrieved from
    • Agrawal, A., et al. (2007b). WS-BPEL extension for people (BPEL4People), version 1.0. Retrieved from http://www.adobe.com/ devnet/livecycle/pdfs/bpel-4people_spec.pdf
  • 4
    • 85036849714 scopus 로고    scopus 로고
    • Anderson, A, 2005, Core and hierarchical role based access control (RBAC) profile of XACML, version 2.0. OASIS. Retrieved from
    • Anderson, A. (2005). Core and hierarchical role based access control (RBAC) profile of XACML, version 2.0. OASIS. Retrieved from http:// docs.oasis-open.org/xacml/2.0/access\_control-xacml-2.0- rbac-profile1-spec-os.pdf
  • 5
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • Proceedings of the Fourth European Symposium on Research in Computer Security, Rome, Springer
    • Atluri, V., & Huang, W. (1996). An authorization model for workflows. In Proceedings of the Fourth European Symposium on Research in Computer Security, Rome (LNCS 1146, pp. 44-64). Springer.
    • (1996) LNCS , vol.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.2
  • 6
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., & Atluri, V. (1999). The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1), 65-104.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 85036869977 scopus 로고    scopus 로고
    • Biron, P., & Malhotra, A. (2004). XML schema part 2: Datatypes. W3C. Retrieved from http://www.w3.org/TR/xmlschema-2
    • Biron, P., & Malhotra, A. (2004). XML schema part 2: Datatypes. W3C. Retrieved from http://www.w3.org/TR/xmlschema-2
  • 8
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • Botha, R. A., & Elofi, J. H. P. (2001). Separation of duties for access control enforcement in workflow environments. IBM Systems Journal, 40(3), 666-682.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.A.1    Elofi, J.H.P.2
  • 9
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • Casati, F., Castano, S., & Fugini, M. (2001). Managing workflow authorization constraints through active database technology. Information Systems Frontiers, 3(3), 319-338.
    • (2001) Information Systems Frontiers , vol.3 , Issue.3 , pp. 319-338
    • Casati, F.1    Castano, S.2    Fugini, M.3
  • 10
    • 85036877379 scopus 로고    scopus 로고
    • Christensen, E, Curbera, F, Meredith, G, & Weerawarana, S, 2001, Web services description language (WSDL) version 1.1. W3C. Retrieved from
    • Christensen, E., Curbera, F., Meredith, G., & Weerawarana, S. (2001). Web services description language (WSDL) version 1.1. W3C. Retrieved from http://www.w3.org/TR/2001/NOTE-wsdl-20010315
  • 11
    • 85036877497 scopus 로고    scopus 로고
    • Clark, J, & DeRose, S, 1999, XML path language (XPath) version 1.0. W3C. Retrieved from
    • Clark, J., & DeRose, S. (1999). XML path language (XPath) version 1.0. W3C. Retrieved from http://www.w3.org/TR/1999 /REC-xpath-19991116
  • 14
    • 85036858109 scopus 로고    scopus 로고
    • Jordan, D, & Evdemon, J, 2007, Web services business process execution language, version 2.0. OASIS. Retrieved from
    • Jordan, D., & Evdemon, J. (2007). Web services business process execution language, version 2.0. OASIS. Retrieved from http:// docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.pdf
  • 15
    • 3543075807 scopus 로고    scopus 로고
    • An access control framework for business processes for Web services
    • October, Fairfax, VA pp
    • Koshutanski, H., & Massacci, F. (2003, October). An access control framework for business processes for Web services. In Proceedings of ACM Workshop on XML Security, Fairfax, VA (pp. 15-24).
    • (2003) Proceedings of ACM Workshop on XML Security , pp. 15-24
    • Koshutanski, H.1    Massacci, F.2
  • 16
    • 0004002694 scopus 로고    scopus 로고
    • IBM Software Group. Retrieved from
    • Leymann, F. (2001). Web services flow language (WSFL 1.0). IBM Software Group. Retrieved from http://www-306.ibm.com/software/solutions/ webservices/pdf/WSFL.pdf
    • (2001) Web services flow language (WSFL 1.0)
    • Leymann, F.1
  • 17
    • 85036905022 scopus 로고    scopus 로고
    • Moses, T, 2005, Extensible access control markup language XACML, version 2.0. OASIS. Retrieved from
    • Moses, T. (2005). Extensible access control markup language (XACML), version 2.0. OASIS. Retrieved from http://docs.oasis-open.org/xacml/ 2.0/access\_control-xacml-2.0-core-spec-os.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.