메뉴 건너뛰기




Volumn 11, Issue 3, 2009, Pages 293-305

Delegating revocations and authorizations in collaborative business environments

Author keywords

Authorization; Collaborative business environment; Revocation

Indexed keywords

ACCESS MANAGEMENT; AUTHORIZATION; BUSINESS ACTIVITIES; BUSINESS ENVIRONMENTS; COLLABORATIVE BUSINESS ENVIRONMENT; COLLABORATIVE COMMERCE; NEGATIVE AUTHORIZATION; REVOCATION; ROLE-BASED DELEGATION; SUPPLY CHAIN COLLABORATION;

EID: 67651163825     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10796-008-9091-6     Document Type: Article
Times cited : (5)

References (30)
  • 4
    • 38949086163 scopus 로고    scopus 로고
    • Access control and authorization constraints for WS-BPEL
    • DOI 10.1109/ICWS.2006.21, 4032037, Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services
    • Bertino, E., Crampton, J., & Paci, F. (2006). Access control and authorization constraints for ws-bpel. In ICWS '06: Proceedings of the IEEE international conference on web services (ICWS'06) (pp. 275-284). Washington, DC, USA: IEEE Computer Society. (Pubitemid 351209863)
    • (2006) Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services , pp. 275-284
    • Bertino, E.1    Crampton, J.2    Paci, F.3
  • 5
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino E. Ferrari V. Atluri 1999 The specification and enforcement of authorization constraints in workflow management systems ACM Transactions on Information and System Security 2 1 65 104
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 8
    • 0000985630 scopus 로고
    • An examination of federal and commercial access control policy needs
    • Baltimore, MD, September
    • David, F. F., Dennis, M. G., & Nickilyn, L. (1993). An examination of federal and commercial access control policy needs. In NIST NCSC national computer security conference (pp. 107-116). Baltimore, MD, September.
    • (1993) NIST NCSC National Computer Security Conference , pp. 107-116
    • David, F.F.1    Dennis, M.G.2    Nickilyn, L.3
  • 12
    • 0345673615 scopus 로고    scopus 로고
    • Revocation schemes for delegated authorities
    • Firozabadi, B., & Sergot, M. (2002). Revocation schemes for delegated authorities. In Proceeding of policy 2002. http://www.citeseer.ist.psu.edu/ firozabadi02revocation.html.
    • (2002) Proceeding of Policy 2002
    • Firozabadi, B.1    Sergot, M.2
  • 14
    • 33846794857 scopus 로고    scopus 로고
    • Access control in collaborative commerce
    • DOI 10.1016/j.dss.2005.05.022, PII S0167923605000874
    • E. Li T. Du J. Wong 2007 Access control in collaborative commerce Decision Support Systems 43 2 675 685 (Pubitemid 46216536)
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 675-685
    • Li, E.Y.1    Du, T.C.2    Wong, J.W.3
  • 18
    • 19344364618 scopus 로고    scopus 로고
    • Role-based access control
    • R. Sandhu 1998 Role-based access control Advances in Computers 46 1 13
    • (1998) Advances in Computers , vol.46 , pp. 1-13
    • Sandhu, R.1
  • 19
    • 20344392161 scopus 로고    scopus 로고
    • Understanding motivations for internet use in distance education
    • DOI 10.1109/TE.2004.842904
    • T. F. Stafford 2005 Understanding motivations for internet use in distance education IEEE Transactions on Education 48 2 301 306 (Pubitemid 40784515)
    • (2005) IEEE Transactions on Education , vol.48 , Issue.2 , pp. 301-306
    • Stafford, T.F.1
  • 21
    • 0348151888 scopus 로고    scopus 로고
    • Formal authorization allocation approaches for role-based access control based on relational algebra operations
    • Wang, H., Cao, J., & Zhang, Y. (2002). Formal authorization allocation approaches for role-based access control based on relational algebra operations. In 3nd international conference on web information systems engineering (WISE02) (pp. 301-312). Singapore, December.
    • (2002) 3nd International Conference on Web Information Systems Engineering (WISE02) , pp. 301-312
    • Wang, H.1    Cao, J.2    Zhang, Y.3
  • 22
    • 33645625808 scopus 로고    scopus 로고
    • Formal authoriza tion allocation approaches for permission-role assignments using relational algebra operations
    • Adelaide, Australia
    • Wang, H., Cao, J., & Zhang, Y. (2003). Formal authoriza tion allocation approaches for permission-role assignments using relational algebra operations. In Proceedings of the 14th Australian database conference ADC2003. Adelaide, Australia.
    • (2003) Proceedings of the 14th Australian Database Conference ADC2003
    • Wang, H.1    Cao, J.2    Zhang, Y.3
  • 30
    • 38049178890 scopus 로고    scopus 로고
    • Version management in the business process change context
    • Lecture Notes in Computer Science, Springer
    • Zhao, X., & Liu, C. (2007). Version management in the business process change context. In 5th international conference on business process management (Vol. 4714, pp. 198-213). Lecture Notes in Computer Science, Springer.
    • (2007) 5th International Conference on Business Process Management , vol.4714 , pp. 198-213
    • Zhao, X.1    Liu, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.