-
1
-
-
33748417848
-
Integration of risk identification with business process models
-
Lambert J.H., Jennings R.K., and Joshi N.N. Integration of risk identification with business process models. Syst. Eng. 9 3 (2006) 187-198
-
(2006)
Syst. Eng.
, vol.9
, Issue.3
, pp. 187-198
-
-
Lambert, J.H.1
Jennings, R.K.2
Joshi, N.N.3
-
2
-
-
38049132539
-
Modeling of task-based authorization constraints in BPMN
-
BPM, Springer
-
Wolter C., and Schaad A. Modeling of task-based authorization constraints in BPMN. BPM. Lecture Notes in Computer Science vol. 4714 (2007), Springer 64-79
-
(2007)
Lecture Notes in Computer Science
, vol.4714
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
-
3
-
-
33750083883
-
-
Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini, Towards a UML 2.0 extension for the modeling of security requirements in business processes, in: TrustBus, 2006, pp. 51-61.
-
Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini, Towards a UML 2.0 extension for the modeling of security requirements in business processes, in: TrustBus, 2006, pp. 51-61.
-
-
-
-
4
-
-
38049150939
-
-
BPM
-
Shazia Wasim Sadiq, Guido Governatori, Kioumars Namiri, Modeling control objectives for business process compliance, in: BPM, 2007, pp. 149-164.
-
(2007)
Modeling control objectives for business process compliance
, pp. 149-164
-
-
Wasim Sadiq, S.1
Governatori, G.2
Namiri, K.3
-
5
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
SACMAT'06, ACM, New York, NY, USA
-
Schaad A., Lotz V., and Sohr K. A model-checking approach to analysing organisational controls in a loan origination process. SACMAT'06. ACM Symposium on Access Control Models and Technologies (2006), ACM, New York, NY, USA 139-149
-
(2006)
ACM Symposium on Access Control Models and Technologies
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
6
-
-
33846674492
-
Introduction to the octave approach
-
Carnegie Mellon Software Engineering Institute, Pittsburgh, PA, USA
-
Alberts C., Dorofee A., Stevens J., and Woody C. Introduction to the octave approach. Networked Systems Survivability Program (2003), Carnegie Mellon Software Engineering Institute, Pittsburgh, PA, USA
-
(2003)
Networked Systems Survivability Program
-
-
Alberts, C.1
Dorofee, A.2
Stevens, J.3
Woody, C.4
-
7
-
-
29744447253
-
Business-driven application security: from modeling to managing secure applications
-
Nagaratnam N., Nadalin A., Hondo M., McIntosh M., and Austel P. Business-driven application security: from modeling to managing secure applications. IBM Syst. J. 44 4 (2005)
-
(2005)
IBM Syst. J.
, vol.44
, Issue.4
-
-
Nagaratnam, N.1
Nadalin, A.2
Hondo, M.3
McIntosh, M.4
Austel, P.5
-
8
-
-
0038825675
-
Task-role-based access control model
-
Oh S., and Park S. Task-role-based access control model. Inform. Syst. 28 6 (2003) 533-562
-
(2003)
Inform. Syst.
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
9
-
-
20444479906
-
A logic-based framework for attribute based access control
-
FMSE'04, ACM, New York, NY, USA
-
Wang L., Wijesekera D., and Jajodia S. A logic-based framework for attribute based access control. FMSE'04. Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering (2004), ACM, New York, NY, USA 45-55
-
(2004)
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
, pp. 45-55
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
10
-
-
63849344981
-
P van der Aalst, Dumas Marlon, ter Hofstede, Arthur H.M. Translating BPMN to BPEL
-
BPM-06-02, 2006
-
Chun Ouyang, Wil M.P van der Aalst, Dumas Marlon, ter Hofstede, Arthur H.M. Translating BPMN to BPEL, in BPM Center Report BPM-06-02, 2006.
-
in BPM Center Report
-
-
Chun, O.1
Wil, M.2
-
12
-
-
38949168454
-
An attribute-based access control model for web services
-
PDCAT'06, IEEE Computer Society, Washington, DC, USA
-
Shen H.b., and Hong F. An attribute-based access control model for web services. PDCAT'06. Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (2006), IEEE Computer Society, Washington, DC, USA 74-79
-
(2006)
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 74-79
-
-
Shen, H.b.1
Hong, F.2
-
13
-
-
0242371001
-
Security for DAML web services: Annotation and matchmaking
-
Grit Denker, Lalana Kagal, Timothy W. Finin, Massimo Paolucci, Katia P. Sycara, Security for DAML web services: annotation and matchmaking, in: International Semantic Web Conference, 2003, pp. 335-350.
-
(2003)
International Semantic Web Conference
, pp. 335-350
-
-
Denker, G.1
Kagal, L.2
Finin, T.W.3
Paolucci, M.4
Sycara, K.P.5
-
14
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., and Coyne E.J. Role-based access control models. IEEE Comput. 29 (1996) 38-47
-
(1996)
IEEE Comput.
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
-
15
-
-
63949085114
-
-
Roshan K. Thomas, Ravi S. Sandhu, Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented autorization management, in: DBSec, 1997, pp. 166-181.
-
Roshan K. Thomas, Ravi S. Sandhu, Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented autorization management, in: DBSec, 1997, pp. 166-181.
-
-
-
-
16
-
-
38949168454
-
An attribute-based access control model for web services
-
IEEE Computer Society pp. 74-79
-
Shen H.b., and Hong F. An attribute-based access control model for web services. PDCAT (2006), IEEE Computer Society pp. 74-79
-
(2006)
PDCAT
-
-
Shen, H.b.1
Hong, F.2
-
17
-
-
0001631966
-
The use of information capacity in schema integration and translation
-
VLDB'93, Morgan Kaufmann Publishers Inc, San Francisco, CA, USA
-
Miller R.J., Ioannidis Y.E., and Ramakrishnan R. The use of information capacity in schema integration and translation. VLDB'93. Proceedings of the 19th International Conference on Very Large Data Bases (1993), Morgan Kaufmann Publishers Inc, San Francisco, CA, USA 120-133
-
(1993)
Proceedings of the 19th International Conference on Very Large Data Bases
, pp. 120-133
-
-
Miller, R.J.1
Ioannidis, Y.E.2
Ramakrishnan, R.3
-
18
-
-
63949084817
-
-
and hierarchical role based access control (RBAC) profile of XACML v2.0. OASIS Standard
-
Anne Anderson, Core and hierarchical role based access control (RBAC) profile of XACML v2.0. OASIS Standard, 2005.
-
(2005)
-
-
Anne Anderson, C.1
-
19
-
-
63949088520
-
-
Jothy Rosenberg, David Remy, Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption, year = 2004, isbn = 0672326515, publisher = Pearson Higher Education.
-
Jothy Rosenberg, David Remy, Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption, year = 2004, isbn = 0672326515, publisher = Pearson Higher Education.
-
-
-
-
20
-
-
63949086372
-
-
Mordechai Ben-Ari, Principles of the Spin Model Checker
-
Mordechai Ben-Ari, Principles of the Spin Model Checker.
-
-
-
-
21
-
-
38949205195
-
Axis2 middleware for next generation web services
-
IEEE Computer Society pp. 833-840
-
Perera S., Herath C., Ekanayake J., Chinthaka E., Ranabahu A., Jayasinghe D., Weerawarana S., and Daniels G. Axis2 middleware for next generation web services. ICWS (2006), IEEE Computer Society pp. 833-840
-
(2006)
ICWS
-
-
Perera, S.1
Herath, C.2
Ekanayake, J.3
Chinthaka, E.4
Ranabahu, A.5
Jayasinghe, D.6
Weerawarana, S.7
Daniels, G.8
-
24
-
-
84944044323
-
-
Till Mossakowski, Michael Drouineaud, Karsten Sohr, A temporal-logic extension of role-based access control covering dynamic separation of duties, in: TIME, 2003, pp. 83-90.
-
Till Mossakowski, Michael Drouineaud, Karsten Sohr, A temporal-logic extension of role-based access control covering dynamic separation of duties, in: TIME, 2003, pp. 83-90.
-
-
-
-
25
-
-
0003697514
-
-
Center for the Study of Language and Information, Stanford, CA, USA
-
Goldblatt R. Logics of Time Computation (1987), Center for the Study of Language and Information, Stanford, CA, USA
-
(1987)
Logics of Time Computation
-
-
Goldblatt, R.1
-
26
-
-
4744347868
-
Best-practice patterns and tool support for configuring secure web services messaging
-
IEEE Computer Society pp. 244-251
-
Tatsubori M., Imamura T., and Nakamura Y. Best-practice patterns and tool support for configuring secure web services messaging. ICWS (2004), IEEE Computer Society pp. 244-251
-
(2004)
ICWS
-
-
Tatsubori, M.1
Imamura, T.2
Nakamura, Y.3
-
27
-
-
63949084283
-
A business process-centered approach for modeling enterprise architectures
-
Torben Schreiter, Guido Laures, A business process-centered approach for modeling enterprise architectures, in: Proceedings of EMISA, 2006.
-
(2006)
Proceedings of EMISA
-
-
Schreiter, T.1
Laures, G.2
-
28
-
-
0041880193
-
Vijayalakshmi Atluri, Secureflow: A secure web-enabled workflow management system
-
Wei kuang Huang, Vijayalakshmi Atluri, Secureflow: a secure web-enabled workflow management system, in: ACM Workshop on Role-Based Access Control, 1999, pp. 83-94.
-
(1999)
ACM Workshop on Role-Based Access Control
, pp. 83-94
-
-
Wei kuang Huang1
-
30
-
-
0242625201
-
Model driven security for process-oriented systems
-
David Basin, Jürgen Doser, Torsten Lodderstedt, Model driven security for process-oriented systems, in: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, 2003, pp. 100-109.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
32
-
-
33646699357
-
Security ontology for annotating resources
-
Anya Kim, Jim Luo, Myong H. Kang, Security ontology for annotating resources, in: OTM Conferences, vol. 2, 2005, pp. 1483-1499.
-
(2005)
OTM Conferences
, vol.2
, pp. 1483-1499
-
-
Kim, A.1
Luo, J.2
Kang, M.H.3
-
33
-
-
0242371001
-
-
Grit Denker, Lalana Kagal, Tim Finin, Massimo Paolucci, Katia Sycara, Security for daml web services: annotation and matchmaking, in: The SemanticWeb - ISWC 2003, 2870/2003, 2005, pp. 335-350.
-
Grit Denker, Lalana Kagal, Tim Finin, Massimo Paolucci, Katia Sycara, Security for daml web services: annotation and matchmaking, in: The SemanticWeb - ISWC 2003, 2870/2003, 2005, pp. 335-350.
-
-
-
|