메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2137-2144

On delegation and workflow execution models

Author keywords

Delegation; Workflow management systems

Indexed keywords

COMPREHENSIVE STUDIES; DELEGATION; DELEGATION MECHANISMS; DELEGATION OPERATIONS; TASK TYPES; WORK-FLOW SYSTEMS; WORKFLOW EXECUTIONS; WORKFLOW MANAGEMENT SYSTEMS;

EID: 56849112018     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1363686.1364199     Document Type: Conference Paper
Times cited : (20)

References (11)
  • 5
    • 33750232667 scopus 로고    scopus 로고
    • Delegation in role-based access control
    • Proceedings of Eleventh European Symposium On Research In Computer Security ESORICS'06, of
    • CRAMPTON, J., AND KHAMBHAMMETTU, H. Delegation in role-based access control. In Proceedings of Eleventh European Symposium On Research In Computer Security (ESORICS'06) (2006). vol. 4189 of LNCS. pp. 174-191.
    • (2006) LNCS , vol.4189 , pp. 174-191
    • CRAMPTON, J.1    KHAMBHAMMETTU, H.2
  • 6
    • 56849130092 scopus 로고    scopus 로고
    • HOLLINGSWORTH, D. Workflow management coalition: The workflow reference model, 1995. Document Number TC00-1003, Document Status- Issue 1.1, Available at http : //www.wfmc.org/standards/docs/tc003v11.pdf.
    • HOLLINGSWORTH, D. Workflow management coalition: The workflow reference model, 1995. Document Number TC00-1003, Document Status- Issue 1.1, Available at http : //www.wfmc.org/standards/docs/tc003v11.pdf.
  • 10
    • 41849098397 scopus 로고    scopus 로고
    • The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system
    • Published electronically. Available at
    • VENTER, K., AND OLIVIER, M. The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system. In Proceedings of Information Security South Africa (ISSA'02) (2002). Published electronically. Available at http://icsa.cs.up.ac. za/issa/2002/proceedings/A021.pdf.
    • (2002) Proceedings of Information Security South Africa (ISSA'02)
    • VENTER, K.1    OLIVIER, M.2
  • 11
    • 33751436350 scopus 로고    scopus 로고
    • DW-RBAC: A formal security model of delegation and revocation in workflow systems
    • WAINER, J., KUMAR, A., AND BARTHELMESS, P. DW-RBAC: A formal security model of delegation and revocation in workflow systems. Information Systems 32, 3 (2007), 365-384.
    • (2007) Information Systems , vol.32 , Issue.3 , pp. 365-384
    • WAINER, J.1    KUMAR, A.2    BARTHELMESS, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.