-
1
-
-
33747074188
-
An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure
-
Dimitrios Georgakopoulos, Mark F. Hornick, and Amit P. Sheth. An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure, Distributed and Parallel Databases, 3(2):119-153, 1995.
-
(1995)
Distributed and Parallel Databases
, vol.3
, Issue.2
, pp. 119-153
-
-
Georgakopoulos, D.1
Hornick, M.F.2
Sheth, A.P.3
-
2
-
-
33748067444
-
A model-checking Approach to Analysing Organisational Controls in a Loan Origination Process
-
New York, NY, USA, ACM
-
Andreas Schaad, Volkmar Lotz, and Karsten Sohr. A model-checking Approach to Analysing Organisational Controls in a Loan Origination Process. In SACM AT '06: Proceedings of the eleventh ACM Symposium, on Access Control Models and Technologies, pages 139-149, New York, NY, USA, 2006. ACM.
-
(2006)
SACM AT '06: Proceedings of the eleventh ACM Symposium, on Access Control Models and Technologies
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
3
-
-
0016555241
-
The Protection of Information in Computer Systems
-
IEEE Computer Society
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proc. IEEE, volume 63, pages 1278-1308. IEEE Computer Society, 1975.
-
(1975)
Proc. IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
4
-
-
0023266943
-
-
David D. Clark and David R, Wilson. A Comparison of Commercial and Military Computer Security Policies. Security and Privacy, 00:184, 1987.
-
David D. Clark and David R, Wilson. A Comparison of Commercial and Military Computer Security Policies. Security and Privacy, 00:184, 1987.
-
-
-
-
6
-
-
0034810791
-
Separation of Duties for Access Control Enforcement in Workflow Environments
-
R. A. Botha and J. H. P. Eloff. Separation of Duties for Access Control Enforcement in Workflow Environments. IBM System Journal, 40(3):666-682, 2001.
-
(2001)
IBM System Journal
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
7
-
-
0002848811
-
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
Elisa Bertino, Elena Ferrari, and Vijay Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. In ACM Transactions on Information and System Security, volume 2, pages 65-104, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
8
-
-
4944250730
-
The Consistency of Task-Based Authorization Constraints in Workflow Systems
-
Kaijun Tan, Jason Crampton, and Carl A. Gunter. The Consistency of Task-Based Authorization Constraints in Workflow Systems. In CSFW, pages 155-, 2004.
-
(2004)
CSFW
, pp. 155
-
-
Tan, K.1
Crampton, J.2
Gunter, C.A.3
-
10
-
-
57349101848
-
-
W. M. P. van der Aalst and A. H. M. ter Hofstede. Workflow Patterns: On the Expressive Power of Workflow Languages. In Proc. of the 4th Workshop on Practical Use of Coloured Petri Nets and the CPN Tools, Aarhus, Denmark, August 28-30, 2002 / Kurt Jensen (Ed,), pages 1-20. Technical Report DAIMI PB-560, August 2002.
-
W. M. P. van der Aalst and A. H. M. ter Hofstede. Workflow Patterns: On the Expressive Power of Workflow Languages. In Proc. of the 4th Workshop on Practical Use of Coloured Petri Nets and the CPN Tools, Aarhus, Denmark, August 28-30, 2002 / Kurt Jensen (Ed,), pages 1-20. Technical Report DAIMI PB-560, August 2002.
-
-
-
-
11
-
-
55849112335
-
On the Suitability of BPMN for Business Process Modelling
-
P. Wohed, W.M.P. van der Aalst, M. Dumas, A.H.M. ter Hofstede, and N. Russell. On the Suitability of BPMN for Business Process Modelling. In Proceedings of the Jtth International Conference on Business Process Management (BPM), 2006.
-
(2006)
Proceedings of the Jtth International Conference on Business Process Management (BPM)
-
-
Wohed, P.1
van der Aalst, W.M.P.2
Dumas, M.3
ter Hofstede, A.H.M.4
Russell, N.5
-
12
-
-
33746207012
-
Pi calculus versus Petri nets: Let us eat humble pie rather than further inflate the Pi hype
-
W. M. P. van der Aalst. Pi calculus versus Petri nets: Let us eat humble pie rather than further inflate the Pi hype. In BPTrends 3, volume 5, pages 1-11, 2005.
-
(2005)
BPTrends 3
, vol.5
, pp. 1-11
-
-
van der Aalst, W.M.P.1
-
13
-
-
30644475116
-
Reference Monitor for Workflow Systems with Constrained Task Execution
-
New York, NY, USA, ACM
-
Jason Crampton. A Reference Monitor for Workflow Systems with Constrained Task Execution. In SACM AT 'O5: Proceedings of the tenth ACM Symposium on Access Control Models and Technologies, pages 38-47, New York, NY, USA, 2005. ACM.
-
(2005)
SACM AT 'O5: Proceedings of the tenth ACM Symposium on Access Control Models and Technologies
, pp. 38-47
-
-
Jason Crampton, A.1
-
14
-
-
38049150939
-
-
Shazia Wasim Sadiq, Guido Governatori, and Kioumars Namiri. Modeling Control Objectives for Business Process Compliance. In BPM, pages 149-164, 2007.
-
Shazia Wasim Sadiq, Guido Governatori, and Kioumars Namiri. Modeling Control Objectives for Business Process Compliance. In BPM, pages 149-164, 2007.
-
-
-
-
15
-
-
33748417848
-
Integration of Risk Identification with Business Process Models
-
James H. Lambert, Rachel K. Jennings, and Nilesh N. Joshi. Integration of Risk Identification with Business Process Models. Syst. Eng., 9(3):187-198, 2006.
-
(2006)
Syst. Eng
, vol.9
, Issue.3
, pp. 187-198
-
-
Lambert, J.H.1
Jennings, R.K.2
Joshi, N.N.3
-
16
-
-
0002841051
-
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management
-
Roshan K. Thomas and Ravi S. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. In IFIP Workshop on Database Security, pages 166-181, 1997.
-
(1997)
IFIP Workshop on Database Security
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
17
-
-
38949086163
-
Access Control and Authorization Constraints for WS-BPEL
-
IEEE Computer Society
-
Elisa Bertino, Jason Crampton, and Federica Paci. Access Control and Authorization Constraints for WS-BPEL, In ICWS, pages 275-284. IEEE Computer Society, 2006.
-
(2006)
ICWS
, pp. 275-284
-
-
Bertino, E.1
Crampton, J.2
Paci, F.3
-
18
-
-
46849087573
-
User Tasks and Access Control over Web Services
-
IEEE Computer Society
-
Jacques Thomas, Federica Paci, Elisa Bertino, and Patrick Eugster. User Tasks and Access Control over Web Services. In ICWS, pages 60-69. IEEE Computer Society, 2007.
-
(2007)
ICWS
, pp. 60-69
-
-
Thomas, J.1
Paci, F.2
Bertino, E.3
Eugster, P.4
-
19
-
-
29744447253
-
Business-driven application security: From Modeling to Managing Secure Applications
-
N. Nagaratnam, A. Nadalin, M. Hondo, M. Mcintosh, and P. Austel. Business-driven application security: From Modeling to Managing Secure Applications. IBM Systems Journal, Vol 44, No 4, 2005.
-
(2005)
IBM Systems Journal
, vol.44
, Issue.4
-
-
Nagaratnam, N.1
Nadalin, A.2
Hondo, M.3
Mcintosh, M.4
Austel, P.5
-
20
-
-
38149139426
-
Deriving XACML Policies from Business Process Models
-
Christian Wolter, Andreas Schaad, and Christoph Meinel. Deriving XACML Policies from Business Process Models. In WISE Workshops, pages 142-153, 2007.
-
(2007)
WISE Workshops
, pp. 142-153
-
-
Wolter, C.1
Schaad, A.2
Meinel, C.3
-
22
-
-
33746204796
-
Workflow Resource Patterns: Identification, Representation and Tool Support
-
Proc. of 17th Int, CAiSE05
-
N. Russell, W.M.P. van der Aalst, A.H.M. ter Hofstede, and D. Edmond. Workflow Resource Patterns: Identification, Representation and Tool Support. In In Proc. of 17th Int. Conf. on Advanced Information Systems Engineering (CAiSE05), 2005.
-
(2005)
Conf. on Advanced Information Systems Engineering
-
-
Russell, N.1
van der Aalst, W.M.P.2
ter Hofstede, A.H.M.3
Edmond, D.4
-
23
-
-
0037411286
-
Workflow Patterns
-
W. M. P. Van Der Aalst, A. H. M. Ter Hofstede, B. Kiepuszewski, and A. P. Barros. Workflow Patterns. Distrib. Parallel Databases, 14(1):5-51, 2003.
-
(2003)
Distrib. Parallel Databases
, vol.14
, Issue.1
, pp. 5-51
-
-
Van Der Aalst, W.M.P.1
Ter Hofstede, A.H.M.2
Kiepuszewski, B.3
Barros, A.P.4
-
26
-
-
34547294402
-
Beyond Separation of Duty: An Algebra for Specifying high-level Security Policies
-
New York, NY, USA, ACM
-
Ninghui Li and Qihua Wang. Beyond Separation of Duty: An Algebra for Specifying high-level Security Policies. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 356-369, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 356-369
-
-
Li, N.1
Wang, Q.2
-
27
-
-
77952749389
-
SecureFlow: A Secure Web-Enabled Workflow Management System
-
Wei-kuang Huang and Vijayalakshmi Atluri. SecureFlow: A Secure Web-Enabled Workflow Management System. In ACM Workshop on Role-Based Access Control, pages 83-94, 1999.
-
(1999)
ACM Workshop on Role-Based Access Control
, pp. 83-94
-
-
Huang, W.-K.1
Atluri, V.2
-
28
-
-
38049066016
-
Satisfiability and Resiliency in Workflow Systems
-
Qihua Wang and Ninghui Li. Satisfiability and Resiliency in Workflow Systems. In ESORICS, pages 90-105, 2007.
-
(2007)
ESORICS
, pp. 90-105
-
-
Wang, Q.1
Li, N.2
-
32
-
-
33750083883
-
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
-
Alfonso Rodríguez, Eduardo Fernández-Medina, and Mario Piattini. Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. In TrustBus, pages 51-61, 2006.
-
(2006)
TrustBus
, pp. 51-61
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
33
-
-
57349091229
-
-
Nick Russell, Arthur, Wil M. P. van der Aalst, and Natalya Mulyar. Workflow Control-Flow Patterns: A Revised View. Technical report, BPMcenter.org, 2006.
-
Nick Russell, Arthur, Wil M. P. van der Aalst, and Natalya Mulyar. Workflow Control-Flow Patterns: A Revised View. Technical report, BPMcenter.org, 2006.
-
-
-
|