-
2
-
-
33646698687
-
-
van der Aalst, W.M.P., Beer, H., van Dongen, B.: Process mining and verification of properties: An approach based on temporal logic. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS. 3760, pp. 130-147. Springer, Heidelberg (2005)
-
van der Aalst, W.M.P., Beer, H., van Dongen, B.: Process mining and verification of properties: An approach based on temporal logic. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS. vol. 3760, pp. 130-147. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
0033650839
-
Injecting RBAC to secure a web-based workflow system
-
Berlin, Germany July
-
Ahn, G.-J., et al.: Injecting RBAC to secure a web-based workflow system. In: Fifth ACM Workshop on Role-Based Access Control, Berlin, Germany (July 2000)
-
(2000)
Fifth ACM Workshop on Role-Based Access Control
-
-
Ahn, G.-J.1
-
4
-
-
84867763616
-
Representation results for defeasible logic
-
Antoniou, G., et al.: Representation results for defeasible logic. ACM Trans. Comput. Log. 2(2), 255-287 (2001)
-
(2001)
ACM Trans. Comput. Log
, vol.2
, Issue.2
, pp. 255-287
-
-
Antoniou, G.1
-
7
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
8
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3) (2001)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
9
-
-
57349176964
-
-
Clocksin, W.F., Mellish, C.S.: Programming in Prolog. Springer, New York (1987)
-
Clocksin, W.F., Mellish, C.S.: Programming in Prolog. Springer, New York (1987)
-
-
-
-
10
-
-
0004034959
-
-
Committee of Sponsoring Organizations
-
Committee of Sponsoring Organizations. Internal Control - Integrated Framework. http://www.coso.org/publications/executive-summary-integrated- framework.htm
-
Internal Control - Integrated Framework
-
-
-
11
-
-
33749992978
-
Enterprise Business Process Management - Architecture, Technology and Standards
-
Vienna. Austria, pp
-
Ferguson, D., Stockton, M.: Enterprise Business Process Management - Architecture, Technology and Standards. In: Business Process Management. Vienna. Austria, pp. 1-15 (2006)
-
(2006)
Business Process Management
, pp. 1-15
-
-
Ferguson, D.1
Stockton, M.2
-
13
-
-
38349027223
-
-
Goedertier, S., Mues, C., Vanthienen, J.: Specifying Process-Aware Access Control Rules in SBVR. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, 4824, pp. 39-52. Springer, Heidelberg (2007)
-
Goedertier, S., Mues, C., Vanthienen, J.: Specifying Process-Aware Access Control Rules in SBVR. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, vol. 4824, pp. 39-52. Springer, Heidelberg (2007)
-
-
-
-
15
-
-
33750144765
-
A Formal Analysis of a Business Contract Language
-
Governatori, G., Milosevic, Z.: A Formal Analysis of a Business Contract Language. Int. J. Cooperative Inf. Syst. 15(4), 659-685 (2006)
-
(2006)
Int. J. Cooperative Inf. Syst
, vol.15
, Issue.4
, pp. 659-685
-
-
Governatori, G.1
Milosevic, Z.2
-
20
-
-
57349146607
-
-
IBM Websphere Business Modeler (WBM), Version 6, http://www-306.ibm.com/ software/integration/wbimodeler/
-
IBM Websphere Business Modeler (WBM), Version 6, http://www-306.ibm.com/ software/integration/wbimodeler/
-
-
-
-
22
-
-
0031346670
-
Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems
-
Fairfax, VA, pp, October
-
Kuhn, D.R.: Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems. In: Proceedings 2nd ACM Workshop on Role-Based Access Control, Fairfax, VA, pp. 23-30 (October 1997)
-
(1997)
Proceedings 2nd ACM Workshop on Role-Based Access Control
, pp. 23-30
-
-
Kuhn, D.R.1
-
23
-
-
4243078497
-
A unified behavioural model and a contract language for extended enterprise
-
Linington, P., et al.: A unified behavioural model and a contract language for extended enterprise. Data Knowl. Eng. 51(1), 5-29 (2004)
-
(2004)
Data Knowl. Eng
, vol.51
, Issue.1
, pp. 5-29
-
-
Linington, P.1
-
24
-
-
4444319368
-
Role-based authorizations for workflow systems in support of task-based separation of duty
-
Liu, D., et al.: Role-based authorizations for workflow systems in support of task-based separation of duty. J. Syst. Softw. 73(3), 375-387 (2004)
-
(2004)
J. Syst. Softw
, vol.73
, Issue.3
, pp. 375-387
-
-
Liu, D.1
-
25
-
-
29744447253
-
Business-driven application security: From modeling to managing secure applications
-
Nagaratnam, N., et al.: Business-driven application security: From modeling to managing secure applications. IBM Systems Journal 44(4) (2005)
-
(2005)
IBM Systems Journal
, vol.44
, Issue.4
-
-
Nagaratnam, N.1
-
27
-
-
0013137299
-
-
Object Management Group OMG
-
Object Management Group (OMG). Object Constraint Language (OCL). http://www.omg.org/technology/documents/modeling-spec-catalog.htm
-
Object Constraint Language (OCL)
-
-
-
28
-
-
38049150939
-
Modeling Control Objectives for Business Process Compliance
-
Sadiq, S., Governatori, G., Namiri, K.: Modeling Control Objectives for Business Process Compliance. In: BPM 2007. pp. 149-164 (2007)
-
(2007)
BPM
, pp. 149-164
-
-
Sadiq, S.1
Governatori, G.2
Namiri, K.3
-
29
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
30
-
-
0030644642
-
Separation of Duty in Role-Based Environments
-
Rockport, MA, June 10-12
-
Simon, R., Zurko, M.E.: Separation of Duty in Role-Based Environments. In: Proceedings of the 10th Computer Security Foundation Workshop. Rockport, MA, June 10-12, 1997. pp. 183-194 (1997)
-
(1997)
Proceedings of the 10th Computer Security Foundation Workshop
, pp. 183-194
-
-
Simon, R.1
Zurko, M.E.2
-
31
-
-
33751436350
-
-
Wainer, J., Kumar, A., Barthelmess, P.: DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems. Information Systems 32(3), 365-384 (2007)
-
Wainer, J., Kumar, A., Barthelmess, P.: DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems. Information Systems 32(3), 365-384 (2007)
-
-
-
|