-
1
-
-
0032218229
-
A security architecture for computational grids
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, "A security architecture for computational grids." in ACM Conference on Computer and Communications Security, 1998, pp. 83-92.
-
(1998)
ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
2
-
-
46149103695
-
Toward an on-demand restricted delegation mechanism for grids
-
IEEE Press, Sep
-
M. Ahsant, J. Basney, O. Mulmo, A. J. Lee, and L. Johnsson, "Toward an on-demand restricted delegation mechanism for grids." in Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (Grid2006). IEEE Press, Sep. 2006, pp. 152-159.
-
(2006)
Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (Grid2006)
, pp. 152-159
-
-
Ahsant, M.1
Basney, J.2
Mulmo, O.3
Lee, A.J.4
Johnsson, L.5
-
3
-
-
47249133315
-
Dynamic, context-aware, least-privilege grid delegation
-
IEEE Press, Sept
-
M. Ahsant, J. Basney, and L. Johnsson, "Dynamic, context-aware, least-privilege grid delegation." in Proceedings of the 8th IEEE/ACM International Conference on Grid Computing (Grid2007). IEEE Press, Sept. 2007, pp. 209-216.
-
(2007)
Proceedings of the 8th IEEE/ACM International Conference on Grid Computing (Grid2007)
, pp. 209-216
-
-
Ahsant, M.1
Basney, J.2
Johnsson, L.3
-
4
-
-
0003479205
-
-
P. Lawrence, Ed, New York, NY, USA: John Wiley & Sons, Inc
-
P. Lawrence, Ed., Workflow handbook 1997. New York, NY, USA: John Wiley & Sons, Inc., 1997.
-
(1997)
Workflow handbook 1997
-
-
-
6
-
-
33747650473
-
Special issue: Workflow in grid systems: Editorials
-
G. C. Fox and D. Gannon, "Special issue: Workflow in grid systems: Editorials," Concurr. Comput. : Pract. Exper., vol. 18, no. 10, pp. 1009-1019, 2006.
-
(2006)
Concurr. Comput. : Pract. Exper
, vol.18
, Issue.10
, pp. 1009-1019
-
-
Fox, G.C.1
Gannon, D.2
-
7
-
-
45449099480
-
Scientific workflow: A survey and research directions
-
A. Barker and J. van Hemert, "Scientific workflow: A survey and research directions," in PPAM, 2007, pp. 746-753.
-
(2007)
PPAM
, pp. 746-753
-
-
Barker, A.1
van Hemert, J.2
-
8
-
-
0000571953
-
Analyzing process models using graph reduction techniques
-
W. Sadiq and M. E. Orlowska, "Analyzing process models using graph reduction techniques," Inf. Syst., vol. 25, no. 2, pp. 117-134, 2000.
-
(2000)
Inf. Syst
, vol.25
, Issue.2
, pp. 117-134
-
-
Sadiq, W.1
Orlowska, M.E.2
-
9
-
-
0032027597
-
Modeling and analysis of workflows using petri nets
-
N. R. Adam, V. Atluri, and W.-K. Huang, "Modeling and analysis of workflows using petri nets," J. Intell. Inf. Syst., vol. 10, no. 2, pp. 131-158, 1998.
-
(1998)
J. Intell. Inf. Syst
, vol.10
, Issue.2
, pp. 131-158
-
-
Adam, N.R.1
Atluri, V.2
Huang, W.-K.3
-
10
-
-
0033652039
-
The nist model for role-based access control: Towards a unified standard
-
NewYork, NY, USA: ACM
-
R. Sandhu, D. Ferraiolo, and R. Kuhn, "The nist model for role-based access control: towards a unified standard," in RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control. NewYork, NY, USA: ACM, 2000, pp. 47-63.
-
(2000)
RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
12
-
-
70349663598
-
-
V. Atluri and W.-K. Huang, An extended petri net model for supporting workflow in a multilevel secure environment, in Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: X : status and prospects. London, UK, UK: Chapman & Hall, Ltd., 1997, pp. 240-258.
-
V. Atluri and W.-K. Huang, "An extended petri net model for supporting workflow in a multilevel secure environment," in Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects. London, UK, UK: Chapman & Hall, Ltd., 1997, pp. 240-258.
-
-
-
-
13
-
-
0031382313
-
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems
-
New York, NY, USA: ACM
-
E. Bertino, E. Ferrari, and V. Atluri, "A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems," in RBAC 97: Proceedings of the second ACM workshop on Role-based access control. New York, NY, USA: ACM, 1997, pp. 1-12.
-
(1997)
RBAC 97: Proceedings of the second ACM workshop on Role-based access control
, pp. 1-12
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
14
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
-, "The specification and enforcement of authorization constraints in workflow management systems," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 65-104, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
15
-
-
27844607906
-
The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system
-
Muldersdrift, South Africa, published electronically
-
K. Venter and M. S. Olivier, "The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system," in ISSA2002, Muldersdrift, South Africa, 2002, published electronically.
-
(2002)
ISSA2002
-
-
Venter, K.1
Olivier, M.S.2
-
16
-
-
33751436350
-
Dw-rbac: A formal security model of delegation and revocation in workflow systems
-
J. Wainer, A. Kumar, and P. Barthelmess, "Dw-rbac: A formal security model of delegation and revocation in workflow systems," Inf. Syst., vol. 32, no. 3, pp. 365-384, 2007.
-
(2007)
Inf. Syst
, vol.32
, Issue.3
, pp. 365-384
-
-
Wainer, J.1
Kumar, A.2
Barthelmess, P.3
|