메뉴 건너뛰기




Volumn 7 LNBIP, Issue , 2008, Pages 273-284

Specifying separation of duty constraints in BPEL4People processes

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SYSTEMS; SEPARATION;

EID: 70350051021     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-540-79396-0_24     Document Type: Conference Paper
Times cited : (23)

References (30)
  • 7
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • Botha, R.A., Elo., J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3) (2001)
    • (2001) IBM Systems Journal , vol.40 , Issue.3
    • Botha, R.A.1    Eloff, J.H.P.2
  • 15
    • 0019608720 scopus 로고
    • Formal models for computer security
    • (September)
    • Landwehr, C.E.: Formal Models for Computer Security. ACM Computing Surveys 13(3) (September 1981)
    • (1981) ACM Computing Surveys , vol.13 , Issue.3
    • Landwehr, C.E.1
  • 16
    • 70350087288 scopus 로고    scopus 로고
    • Process aware information systems: Bridging people and software through process technology
    • Wiley Publishing, Chichester
    • Mendling, J., zur Muehlen, M., Price, A.: Process Aware Information Systems: Bridging People and Software Through Process Technology. In: Standards for Workflow De.nition and Execution, pp. 281-316. Wiley Publishing, Chichester (2005)
    • (2005) Standards for Workflow De.nition and Execution , pp. 281-316
    • Mendling, J.1    Zur Muehlen, M.2    Price, A.3
  • 19
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • (February)
    • Osborn, S., Sandhu, R., Munawer, Q.: Con.guring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security (TISSEC) 3(2) (February 2000)
    • (2000) ACM Transactions on Information and System Security (TISSEC) , vol.3 , Issue.2
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 20
    • 70350086918 scopus 로고    scopus 로고
    • Evaluation of the BPEL4People and WSHumanTask Extensions to WS-BPEL 2.0 using the workflow resource patterns
    • BPMcenter.org
    • Russell, N., van der Aalst, W.M.P.: Evaluation of the BPEL4People and WSHumanTask Extensions to WS-BPEL 2.0 using the Workflow Resource Patterns. BPM Center Report BPM-07-10, BPMcenter.org (2007)
    • (2007) BPM Center Report BPM-07-10
    • Russell, N.1    Van Der Aalst, W.M.P.2
  • 21
    • 25144499038 scopus 로고    scopus 로고
    • Workflow resource patterns: Identification, representation and tool support
    • Pastor, Ó Falcao e Cunha J. (eds.). CAiSE 2005 Springer, Heidelberg
    • Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow resource patterns: Identi.cation, representation and tool support. In: Pastor, ́ O., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol.3520, pp. 216-232. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3520 , pp. 216-232
    • Russell, N.1    Van Der Aalst, W.M.P.2    Ter Hofstede, A.H.M.3    Edmond, D.4
  • 22
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • (September)
    • Sandhu, R.S., Samarati, P.: Access control: Principles and practice. IEEE Communications 32(9) (September 1994)
    • (1994) IEEE Communications , vol.32 , Issue.9
    • Sandhu, R.S.1    Samarati, P.2
  • 23
    • 4444270398 scopus 로고    scopus 로고
    • Conffict checking of separation of duty constraints in RBAC - Implementation experiences
    • (February)
    • Strembeck, M.: Con.ict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences. In: Proc. of the Conference on Software Engineering (SE 2004) (February 2004)
    • (2004) Proc. of the Conference on Software Engineering (SE 2004)
    • Strembeck, M.1
  • 28
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (tmac): A primitive for applying role-based access controls in collaborative environments
    • Thomas, R.K.: Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. In: Proc. of the ACM Workshop on Role Based Access Control (1997)
    • (1997) Proc. of the ACM Workshop on Role Based Access Control
    • Thomas, R.K.1
  • 29
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • (August)
    • Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: Proc. of the IFIP WG11.3 Conference on Database Security (August 1997)
    • (1997) Proc. of the IFIP WG11.3 Conference on Database Security
    • Thomas, R.K.1    Sandhu, R.S.2
  • 30
    • 38049132539 scopus 로고    scopus 로고
    • Modeling of task-based authorization constraints in BPMN
    • Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. Springer, Heidelberg
    • Wolter, C., Schaad, A.: Modeling of Task-Based Authorization Constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol.4714, pp. 64-79. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4714 , pp. 64-79
    • Wolter, C.1    Schaad, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.