메뉴 건너뛰기




Volumn 4, Issue 1, 2009, Pages 50-66

A location-aware access control model for mobile workflow systems

Author keywords

Access control; Location aware computing; Mobile workflow systems; Security model

Indexed keywords

INFORMATION MANAGEMENT; INFORMATION SYSTEMS; LOCATION; MANAGEMENT INFORMATION SYSTEMS; WORK SIMPLIFICATION;

EID: 70249128344     PISSN: 15541045     EISSN: 15541053     Source Type: Journal    
DOI: 10.4018/jitwe.2009010104     Document Type: Article
Times cited : (5)

References (28)
  • 5
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • 1999
    • Bertino, E., Ferrari, E., & Atluri, V. (1999). The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security. 2(1), 1999, 65-104.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 11
    • 1542341270 scopus 로고    scopus 로고
    • Location-Based authentication: Grounding cyberspace for better security
    • February 1996
    • Denning, D., & MacDoran, P. (1996). Location- Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud & Security, February 1996, 12-16.
    • (1996) Computer Fraud & Security , pp. 12-16
    • Denning, D.1    MacDoran, P.2
  • 12
    • 33845422335 scopus 로고    scopus 로고
    • What we talk about when we talk about context
    • Dourish, P. (2003): What we talk about when we talk about context. Personal Ubiquitous Computing, 8(1), 19-30.
    • (2003) Personal Ubiquitous Computing , vol.8 , Issue.1 , pp. 19-30
    • Dourish, P.1
  • 15
    • 0035424017 scopus 로고    scopus 로고
    • Location systems for ubiquitous computing
    • Hightower, J., & Boriello, G. (2001). Location Systems for Ubiquitous Computing. IEEE Computer, 34(8), 57-66.
    • (2001) IEEE Computer , vol.34 , Issue.8 , pp. 57-66
    • Hightower, J.1    Boriello, G.2
  • 19
    • 0002179618 scopus 로고
    • Operating Systems Review
    • Lampson, B. (1974). Protection. Operating Systems Review, 8(1), 18-24.
    • (1974) Protection , vol.8 , Issue.1 , pp. 18-24
    • Lampson, B.1
  • 21
    • 58449135297 scopus 로고    scopus 로고
    • Person-to-application processes: Workflow management
    • Dumas, M., van der Aalst, W., & Hofstede, A. (Ed.), Wiley & Sons, Hoboken, New Jersey, USA
    • Oberweis, A. (2005): Person-to-Application Processes: Workflow Management. In Dumas, M., van der Aalst, W., & Hofstede, A. (Ed.), Process-Aware Information Systems. Bridging People and Software Through Process Technology, Wiley & Sons, Hoboken, New Jersey, USA, 21-36.
    • (2005) Process-Aware Information Systems. Bridging People and Software Through Process Technology , pp. 21-36
    • Oberweis, A.1
  • 23
    • 32444439291 scopus 로고    scopus 로고
    • Towards a Location- based mandatory access control model
    • Ray, I., and Kumar, M. (2006). Towards a Location- based Mandatory Access Control Model. Computer & Security, 25(1), 36-44.
    • (2006) Computer & Security , vol.25 , Issue.1 , pp. 36-44
    • Ray, I.1    Kumar, M.2
  • 25
    • 0003342146 scopus 로고
    • Separation of Duties in Computerized Information Systems
    • Halifax, U.K.
    • Sandhu, R. (1991). Separation of Duties in Computerized Information Systems. Database Security IV: Status and Prospects, Halifax, U.K., 179-189.
    • (1991) Database Security IV: Status and Prospects , pp. 179-189
    • Sandhu, R.1
  • 27
    • 1442269795 scopus 로고    scopus 로고
    • PDA- and agent-based execution of workflow tasks
    • Vienna, Austria
    • Stormer, H., & Knorr, K. (2001). PDA- and Agent-based Execution of Workflow Tasks. Proceedings of Informatik 2001, Vienna, Austria, 968-973.
    • (2001) Proceedings of Informatik 2001 , pp. 968-973
    • Stormer, H.1    Knorr, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.