메뉴 건너뛰기




Volumn 5321 LNCS, Issue , 2008, Pages 58-72

A rule-based framework using role patterns for business process compliance

Author keywords

Compliant business process; Constraints; Control policies; Declarative approach; Generic role patterns; Internal control; Rules; Sarbanes oxley; Separation of duty; Task categories

Indexed keywords

ACCESS CONTROL; COMPUTER PROGRAMMING LANGUAGES; FINANCE;

EID: 57349133023     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88808-6_9     Document Type: Conference Paper
Times cited : (14)

References (31)
  • 2
    • 33646698687 scopus 로고    scopus 로고
    • van der Aalst, W.M.P., Beer, H., van Dongen, B.: Process mining and verification of properties: An approach based on temporal logic. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS. 3760, pp. 130-147. Springer, Heidelberg (2005)
    • van der Aalst, W.M.P., Beer, H., van Dongen, B.: Process mining and verification of properties: An approach based on temporal logic. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS. vol. 3760, pp. 130-147. Springer, Heidelberg (2005)
  • 3
    • 0033650839 scopus 로고    scopus 로고
    • Injecting RBAC to secure a web-based workflow system
    • Berlin, Germany July
    • Ahn, G.-J., et al.: Injecting RBAC to secure a web-based workflow system. In: Fifth ACM Workshop on Role-Based Access Control, Berlin, Germany (July 2000)
    • (2000) Fifth ACM Workshop on Role-Based Access Control
    • Ahn, G.-J.1
  • 4
    • 84867763616 scopus 로고    scopus 로고
    • Representation results for defeasible logic
    • Antoniou, G., et al.: Representation results for defeasible logic. ACM Trans. Comput. Log. 2(2), 255-287 (2001)
    • (2001) ACM Trans. Comput. Log , vol.2 , Issue.2 , pp. 255-287
    • Antoniou, G.1
  • 7
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 8
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3) (2001)
    • (2001) IBM Systems Journal , vol.40 , Issue.3
    • Botha, R.A.1    Eloff, J.H.P.2
  • 9
    • 57349176964 scopus 로고    scopus 로고
    • Clocksin, W.F., Mellish, C.S.: Programming in Prolog. Springer, New York (1987)
    • Clocksin, W.F., Mellish, C.S.: Programming in Prolog. Springer, New York (1987)
  • 10
    • 0004034959 scopus 로고    scopus 로고
    • Committee of Sponsoring Organizations
    • Committee of Sponsoring Organizations. Internal Control - Integrated Framework. http://www.coso.org/publications/executive-summary-integrated- framework.htm
    • Internal Control - Integrated Framework
  • 11
    • 33749992978 scopus 로고    scopus 로고
    • Enterprise Business Process Management - Architecture, Technology and Standards
    • Vienna. Austria, pp
    • Ferguson, D., Stockton, M.: Enterprise Business Process Management - Architecture, Technology and Standards. In: Business Process Management. Vienna. Austria, pp. 1-15 (2006)
    • (2006) Business Process Management , pp. 1-15
    • Ferguson, D.1    Stockton, M.2
  • 13
    • 38349027223 scopus 로고    scopus 로고
    • Goedertier, S., Mues, C., Vanthienen, J.: Specifying Process-Aware Access Control Rules in SBVR. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, 4824, pp. 39-52. Springer, Heidelberg (2007)
    • Goedertier, S., Mues, C., Vanthienen, J.: Specifying Process-Aware Access Control Rules in SBVR. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, vol. 4824, pp. 39-52. Springer, Heidelberg (2007)
  • 15
    • 33750144765 scopus 로고    scopus 로고
    • A Formal Analysis of a Business Contract Language
    • Governatori, G., Milosevic, Z.: A Formal Analysis of a Business Contract Language. Int. J. Cooperative Inf. Syst. 15(4), 659-685 (2006)
    • (2006) Int. J. Cooperative Inf. Syst , vol.15 , Issue.4 , pp. 659-685
    • Governatori, G.1    Milosevic, Z.2
  • 20
    • 57349146607 scopus 로고    scopus 로고
    • IBM Websphere Business Modeler (WBM), Version 6, http://www-306.ibm.com/ software/integration/wbimodeler/
    • IBM Websphere Business Modeler (WBM), Version 6, http://www-306.ibm.com/ software/integration/wbimodeler/
  • 22
    • 0031346670 scopus 로고    scopus 로고
    • Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems
    • Fairfax, VA, pp, October
    • Kuhn, D.R.: Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems. In: Proceedings 2nd ACM Workshop on Role-Based Access Control, Fairfax, VA, pp. 23-30 (October 1997)
    • (1997) Proceedings 2nd ACM Workshop on Role-Based Access Control , pp. 23-30
    • Kuhn, D.R.1
  • 23
    • 4243078497 scopus 로고    scopus 로고
    • A unified behavioural model and a contract language for extended enterprise
    • Linington, P., et al.: A unified behavioural model and a contract language for extended enterprise. Data Knowl. Eng. 51(1), 5-29 (2004)
    • (2004) Data Knowl. Eng , vol.51 , Issue.1 , pp. 5-29
    • Linington, P.1
  • 24
    • 4444319368 scopus 로고    scopus 로고
    • Role-based authorizations for workflow systems in support of task-based separation of duty
    • Liu, D., et al.: Role-based authorizations for workflow systems in support of task-based separation of duty. J. Syst. Softw. 73(3), 375-387 (2004)
    • (2004) J. Syst. Softw , vol.73 , Issue.3 , pp. 375-387
    • Liu, D.1
  • 25
    • 29744447253 scopus 로고    scopus 로고
    • Business-driven application security: From modeling to managing secure applications
    • Nagaratnam, N., et al.: Business-driven application security: From modeling to managing secure applications. IBM Systems Journal 44(4) (2005)
    • (2005) IBM Systems Journal , vol.44 , Issue.4
    • Nagaratnam, N.1
  • 27
    • 0013137299 scopus 로고    scopus 로고
    • Object Management Group OMG
    • Object Management Group (OMG). Object Constraint Language (OCL). http://www.omg.org/technology/documents/modeling-spec-catalog.htm
    • Object Constraint Language (OCL)
  • 28
    • 38049150939 scopus 로고    scopus 로고
    • Modeling Control Objectives for Business Process Compliance
    • Sadiq, S., Governatori, G., Namiri, K.: Modeling Control Objectives for Business Process Compliance. In: BPM 2007. pp. 149-164 (2007)
    • (2007) BPM , pp. 149-164
    • Sadiq, S.1    Governatori, G.2    Namiri, K.3
  • 31
    • 33751436350 scopus 로고    scopus 로고
    • Wainer, J., Kumar, A., Barthelmess, P.: DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems. Information Systems 32(3), 365-384 (2007)
    • Wainer, J., Kumar, A., Barthelmess, P.: DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems. Information Systems 32(3), 365-384 (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.