-
1
-
-
0030189617
-
Exotica/ FMDC: A Workflow management System for Mobile and Disconnected Clients
-
Alonso, G., Günthör, R., Kamath, M., Agrawal D., El Abbadi, A., & Mohan, C. (1996). Exotica/ FMDC: A Workflow management System for Mobile and Disconnected Clients. Distributed and Parallel Databases, 4(3), 229-247.
-
(1996)
Distributed and Parallel Databases
, vol.4
, Issue.3
, pp. 229-247
-
-
Alonso, G.1
Günthör, R.2
Kamath, M.3
Agrawal, D.4
El Abbadi, A.5
Mohan, C.6
-
3
-
-
0003400251
-
-
Technical Report of MITRE Corporation, Bradford, MA, U.S.A.
-
Bell, D. E., & LaPadula, J. (1976). Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report of MITRE Corporation, Bradford, MA, U.S.A.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
Lapadula, J.2
-
5
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
1999
-
Bertino, E., Ferrari, E., & Atluri, V. (1999). The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security. 2(1), 1999, 65-104.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
8
-
-
52149085945
-
Data security in location-aware applications: An approach based on RBAC
-
Damiani, M. L, Bertino, E., & Perlasca, P. (2007). Data Security in Location-Aware Applications: An Approach Based on RBAC. International Journal of Information and Computer Security. 1(1/2), 5-38.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 5-38
-
-
Damiani, M.L.1
Bertino, E.2
Perlasca, P.3
-
9
-
-
85118202136
-
Supporting mobile business workflow with commune
-
Washington, DC, USA, IEEE
-
th IEEE Workshop on Mobile Computing System & Applications (WMCSA), Washington, DC, USA, IEEE, 10-18.
-
(2006)
th IEEE Workshop on Mobile Computing System & Applications (WMCSA)
, pp. 10-18
-
-
Davis, J.1
Sow, D.2
Bourges-Waldegg, D.3
Guo, C.4
Hoertnagl, C.5
Stolze, M.6
Eagle, B.7
Yin, Y.8
-
11
-
-
1542341270
-
Location-Based authentication: Grounding cyberspace for better security
-
February 1996
-
Denning, D., & MacDoran, P. (1996). Location- Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud & Security, February 1996, 12-16.
-
(1996)
Computer Fraud & Security
, pp. 12-16
-
-
Denning, D.1
MacDoran, P.2
-
12
-
-
33845422335
-
What we talk about when we talk about context
-
Dourish, P. (2003): What we talk about when we talk about context. Personal Ubiquitous Computing, 8(1), 19-30.
-
(2003)
Personal Ubiquitous Computing
, vol.8
, Issue.1
, pp. 19-30
-
-
Dourish, P.1
-
14
-
-
24644480838
-
SRBAC: A spatial role-based access control model for mobile systems
-
Gjovik, Norway
-
Hansen, F., & Oleshchuk, V. (2003). SRBAC: A Spatial Role-Based Access Control Model for Mobile Systems. Proceedings of the Nordic Workshop on Secure IT Systems (NORDSEC), Gjovik, Norway, 129-141.
-
(2003)
Proceedings of the Nordic Workshop on Secure IT Systems (NORDSEC)
, pp. 129-141
-
-
Hansen, F.1
Oleshchuk, V.2
-
15
-
-
0035424017
-
Location systems for ubiquitous computing
-
Hightower, J., & Boriello, G. (2001). Location Systems for Ubiquitous Computing. IEEE Computer, 34(8), 57-66.
-
(2001)
IEEE Computer
, vol.34
, Issue.8
, pp. 57-66
-
-
Hightower, J.1
Boriello, G.2
-
16
-
-
0033892805
-
WHAM. Supporting mobile workforce and applications in workflow environments
-
San Diego, California, USA
-
Jing, J., Huff, K., Hurwitz, B., Sinha, H., Robinson, B., & Feblowitz, M. (2000). WHAM. Supporting Mobile Workforce and Applications in Workflow Environments. Proceedings of 10th International Workshop on Research Issues in Data Engineering (RIDE), San Diego, California, USA, 2000, 31-38.
-
(2000)
Proceedings of 10th International Workshop on Research Issues in Data Engineering (RIDE)
, pp. 31-38
-
-
Jing, J.1
Huff, K.2
Hurwitz, B.3
Sinha, H.4
Robinson, B.5
Feblowitz, M.6
-
17
-
-
38049143822
-
STRBAC - An approach towards spatio-temporal role-based access control
-
Kumar, M., & Newman, R. E. (2006). STRBAC - An Approach Towards Spatio-Temporal Role-Based Access Control. Proceedings of the Conference on Communication, Network, and Information Security (CNIS), 150-155.
-
(2006)
Proceedings of the Conference on Communication, Network, and Information Security (CNIS)
, pp. 150-155
-
-
Kumar, M.1
Newman, R.E.2
-
19
-
-
0002179618
-
-
Operating Systems Review
-
Lampson, B. (1974). Protection. Operating Systems Review, 8(1), 18-24.
-
(1974)
Protection
, vol.8
, Issue.1
, pp. 18-24
-
-
Lampson, B.1
-
21
-
-
58449135297
-
Person-to-application processes: Workflow management
-
Dumas, M., van der Aalst, W., & Hofstede, A. (Ed.), Wiley & Sons, Hoboken, New Jersey, USA
-
Oberweis, A. (2005): Person-to-Application Processes: Workflow Management. In Dumas, M., van der Aalst, W., & Hofstede, A. (Ed.), Process-Aware Information Systems. Bridging People and Software Through Process Technology, Wiley & Sons, Hoboken, New Jersey, USA, 21-36.
-
(2005)
Process-Aware Information Systems. Bridging People and Software Through Process Technology
, pp. 21-36
-
-
Oberweis, A.1
-
23
-
-
32444439291
-
Towards a Location- based mandatory access control model
-
Ray, I., and Kumar, M. (2006). Towards a Location- based Mandatory Access Control Model. Computer & Security, 25(1), 36-44.
-
(2006)
Computer & Security
, vol.25
, Issue.1
, pp. 36-44
-
-
Ray, I.1
Kumar, M.2
-
24
-
-
85015437589
-
LRBAC: A location-aware role-based access control model
-
Kolkata, India
-
Ray, I., Kumar, M., & Yu, L. (2006). LRBAC: A Location-Aware Role-Based Access Control Model. Second International Conference on Information Systems Security (ICISS), Kolkata, India, 147-161.
-
(2006)
Second International Conference on Information Systems Security (ICISS)
, pp. 147-161
-
-
Ray, I.1
Kumar, M.2
Yu, L.3
-
25
-
-
0003342146
-
Separation of Duties in Computerized Information Systems
-
Halifax, U.K.
-
Sandhu, R. (1991). Separation of Duties in Computerized Information Systems. Database Security IV: Status and Prospects, Halifax, U.K., 179-189.
-
(1991)
Database Security IV: Status and Prospects
, pp. 179-189
-
-
Sandhu, R.1
-
26
-
-
1542317849
-
Secure Verification of Location Claims
-
San Diego, California, USA
-
Sastry, N., Shankar, U., & Wagner, D. (2003). Secure Verification of Location Claims. Proceedings of the Conference on Wireless Security (WiSe), San Diego, California, USA, 1-10.
-
(2003)
Proceedings of the Conference on Wireless Security (WiSe)
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
27
-
-
1442269795
-
PDA- and agent-based execution of workflow tasks
-
Vienna, Austria
-
Stormer, H., & Knorr, K. (2001). PDA- and Agent-based Execution of Workflow Tasks. Proceedings of Informatik 2001, Vienna, Austria, 968-973.
-
(2001)
Proceedings of Informatik 2001
, pp. 968-973
-
-
Stormer, H.1
Knorr, K.2
-
28
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
Wainer, J., Barthelmess, P., & Kumar, A. (2003). W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems, 12(4), 455-485.
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
|