메뉴 건너뛰기




Volumn , Issue , 2008, Pages 51-60

Task-based entailment constraints for basic workflow patterns

Author keywords

Access control; Separation of duty; Task based entailment constraints; Workflow management; Workflow modelling

Indexed keywords

FLOW PATTERNS; INFORMATION MANAGEMENT; MANAGEMENT; SECURITY SYSTEMS; WORK SIMPLIFICATION;

EID: 57349111770     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1377836.1377844     Document Type: Conference Paper
Times cited : (39)

References (33)
  • 1
    • 33747074188 scopus 로고
    • An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure
    • Dimitrios Georgakopoulos, Mark F. Hornick, and Amit P. Sheth. An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure, Distributed and Parallel Databases, 3(2):119-153, 1995.
    • (1995) Distributed and Parallel Databases , vol.3 , Issue.2 , pp. 119-153
    • Georgakopoulos, D.1    Hornick, M.F.2    Sheth, A.P.3
  • 3
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • IEEE Computer Society
    • J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proc. IEEE, volume 63, pages 1278-1308. IEEE Computer Society, 1975.
    • (1975) Proc. IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 4
    • 0023266943 scopus 로고    scopus 로고
    • David D. Clark and David R, Wilson. A Comparison of Commercial and Military Computer Security Policies. Security and Privacy, 00:184, 1987.
    • David D. Clark and David R, Wilson. A Comparison of Commercial and Military Computer Security Policies. Security and Privacy, 00:184, 1987.
  • 6
    • 0034810791 scopus 로고    scopus 로고
    • Separation of Duties for Access Control Enforcement in Workflow Environments
    • R. A. Botha and J. H. P. Eloff. Separation of Duties for Access Control Enforcement in Workflow Environments. IBM System Journal, 40(3):666-682, 2001.
    • (2001) IBM System Journal , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.A.1    Eloff, J.H.P.2
  • 7
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • Elisa Bertino, Elena Ferrari, and Vijay Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. In ACM Transactions on Information and System Security, volume 2, pages 65-104, 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 8
    • 4944250730 scopus 로고    scopus 로고
    • The Consistency of Task-Based Authorization Constraints in Workflow Systems
    • Kaijun Tan, Jason Crampton, and Carl A. Gunter. The Consistency of Task-Based Authorization Constraints in Workflow Systems. In CSFW, pages 155-, 2004.
    • (2004) CSFW , pp. 155
    • Tan, K.1    Crampton, J.2    Gunter, C.A.3
  • 10
    • 57349101848 scopus 로고    scopus 로고
    • W. M. P. van der Aalst and A. H. M. ter Hofstede. Workflow Patterns: On the Expressive Power of Workflow Languages. In Proc. of the 4th Workshop on Practical Use of Coloured Petri Nets and the CPN Tools, Aarhus, Denmark, August 28-30, 2002 / Kurt Jensen (Ed,), pages 1-20. Technical Report DAIMI PB-560, August 2002.
    • W. M. P. van der Aalst and A. H. M. ter Hofstede. Workflow Patterns: On the Expressive Power of Workflow Languages. In Proc. of the 4th Workshop on Practical Use of Coloured Petri Nets and the CPN Tools, Aarhus, Denmark, August 28-30, 2002 / Kurt Jensen (Ed,), pages 1-20. Technical Report DAIMI PB-560, August 2002.
  • 12
    • 33746207012 scopus 로고    scopus 로고
    • Pi calculus versus Petri nets: Let us eat humble pie rather than further inflate the Pi hype
    • W. M. P. van der Aalst. Pi calculus versus Petri nets: Let us eat humble pie rather than further inflate the Pi hype. In BPTrends 3, volume 5, pages 1-11, 2005.
    • (2005) BPTrends 3 , vol.5 , pp. 1-11
    • van der Aalst, W.M.P.1
  • 14
    • 38049150939 scopus 로고    scopus 로고
    • Shazia Wasim Sadiq, Guido Governatori, and Kioumars Namiri. Modeling Control Objectives for Business Process Compliance. In BPM, pages 149-164, 2007.
    • Shazia Wasim Sadiq, Guido Governatori, and Kioumars Namiri. Modeling Control Objectives for Business Process Compliance. In BPM, pages 149-164, 2007.
  • 15
    • 33748417848 scopus 로고    scopus 로고
    • Integration of Risk Identification with Business Process Models
    • James H. Lambert, Rachel K. Jennings, and Nilesh N. Joshi. Integration of Risk Identification with Business Process Models. Syst. Eng., 9(3):187-198, 2006.
    • (2006) Syst. Eng , vol.9 , Issue.3 , pp. 187-198
    • Lambert, J.H.1    Jennings, R.K.2    Joshi, N.N.3
  • 16
    • 0002841051 scopus 로고    scopus 로고
    • Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management
    • Roshan K. Thomas and Ravi S. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. In IFIP Workshop on Database Security, pages 166-181, 1997.
    • (1997) IFIP Workshop on Database Security , pp. 166-181
    • Thomas, R.K.1    Sandhu, R.S.2
  • 17
    • 38949086163 scopus 로고    scopus 로고
    • Access Control and Authorization Constraints for WS-BPEL
    • IEEE Computer Society
    • Elisa Bertino, Jason Crampton, and Federica Paci. Access Control and Authorization Constraints for WS-BPEL, In ICWS, pages 275-284. IEEE Computer Society, 2006.
    • (2006) ICWS , pp. 275-284
    • Bertino, E.1    Crampton, J.2    Paci, F.3
  • 18
    • 46849087573 scopus 로고    scopus 로고
    • User Tasks and Access Control over Web Services
    • IEEE Computer Society
    • Jacques Thomas, Federica Paci, Elisa Bertino, and Patrick Eugster. User Tasks and Access Control over Web Services. In ICWS, pages 60-69. IEEE Computer Society, 2007.
    • (2007) ICWS , pp. 60-69
    • Thomas, J.1    Paci, F.2    Bertino, E.3    Eugster, P.4
  • 19
    • 29744447253 scopus 로고    scopus 로고
    • Business-driven application security: From Modeling to Managing Secure Applications
    • N. Nagaratnam, A. Nadalin, M. Hondo, M. Mcintosh, and P. Austel. Business-driven application security: From Modeling to Managing Secure Applications. IBM Systems Journal, Vol 44, No 4, 2005.
    • (2005) IBM Systems Journal , vol.44 , Issue.4
    • Nagaratnam, N.1    Nadalin, A.2    Hondo, M.3    Mcintosh, M.4    Austel, P.5
  • 20
    • 38149139426 scopus 로고    scopus 로고
    • Deriving XACML Policies from Business Process Models
    • Christian Wolter, Andreas Schaad, and Christoph Meinel. Deriving XACML Policies from Business Process Models. In WISE Workshops, pages 142-153, 2007.
    • (2007) WISE Workshops , pp. 142-153
    • Wolter, C.1    Schaad, A.2    Meinel, C.3
  • 27
    • 77952749389 scopus 로고    scopus 로고
    • SecureFlow: A Secure Web-Enabled Workflow Management System
    • Wei-kuang Huang and Vijayalakshmi Atluri. SecureFlow: A Secure Web-Enabled Workflow Management System. In ACM Workshop on Role-Based Access Control, pages 83-94, 1999.
    • (1999) ACM Workshop on Role-Based Access Control , pp. 83-94
    • Huang, W.-K.1    Atluri, V.2
  • 28
    • 38049066016 scopus 로고    scopus 로고
    • Satisfiability and Resiliency in Workflow Systems
    • Qihua Wang and Ninghui Li. Satisfiability and Resiliency in Workflow Systems. In ESORICS, pages 90-105, 2007.
    • (2007) ESORICS , pp. 90-105
    • Wang, Q.1    Li, N.2
  • 32
    • 33750083883 scopus 로고    scopus 로고
    • Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
    • Alfonso Rodríguez, Eduardo Fernández-Medina, and Mario Piattini. Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. In TrustBus, pages 51-61, 2006.
    • (2006) TrustBus , pp. 51-61
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 33
    • 57349091229 scopus 로고    scopus 로고
    • Nick Russell, Arthur, Wil M. P. van der Aalst, and Natalya Mulyar. Workflow Control-Flow Patterns: A Revised View. Technical report, BPMcenter.org, 2006.
    • Nick Russell, Arthur, Wil M. P. van der Aalst, and Natalya Mulyar. Workflow Control-Flow Patterns: A Revised View. Technical report, BPMcenter.org, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.