-
1
-
-
70349884796
-
-
Agrawal, A., Amend, M., Das, M., Keller, C., Kloppmann, M., König, D., Leymann, F., Müller, R., Pfau, G., Ploesser, K., Rangaswamy, R., Rickayzen, A., Rowley, M., Schmidt, P., Trickovic, I., Yiu, A., Zeller, M.: Web services human task (WSHumanTask), version 1.0 (2007)
-
(2007)
Web Services Human Task (WSHumanTask) Version 1.0
-
-
Agrawal, A.1
Amend, M.2
Das, M.3
Keller, C.4
Kloppmann, M.5
König, D.6
Leymann, F.7
Müller, R.8
Pfau, G.9
Ploesser, K.10
Rangaswamy, R.11
Rickayzen, A.12
Rowley, M.13
Schmidt, P.14
Trickovic, I.15
Yiu, A.16
Zeller, M.17
-
2
-
-
70349912341
-
-
Agrawal, A., Amend, M., Das, M., Keller, C., Kloppmann, M., König, D., Leymann, F., Müller, R., Pfau, G., Ploesser, K., Rangaswamy, R., Rickayzen, A., Rowley, M., Schmidt, P., Trickovic, I., Yiu, A., Zeller, M.: WS-BPEL extension for people (BPEL4People), version 1.0 (2007)
-
(2007)
WS-BPEL Extension for People (BPEL4People) Version 1.0
-
-
Agrawal, A.1
Amend, M.2
Das, M.3
Keller, C.4
Kloppmann, M.5
König, D.6
Leymann, F.7
Müller, R.8
Pfau, G.9
Ploesser, K.10
Rangaswamy, R.11
Rickayzen, A.12
Rowley, M.13
Schmidt, P.14
Trickovic, I.15
Yiu, A.16
Zeller, M.17
-
4
-
-
41649087956
-
Web Services Business Process Execution Language - Version 2.0.
-
Alves, A., Arkin, A., Askary, S., Barreto, C., Bloch, B., Curbera, F., Ford, M., Goland, Y., Guizar, A., Kartha, N., Liu, C.K., Khalaf, R., Koenig, D., Marin, M., Mehta, V., Thatte, S., van der Rijn, D., Yendluri, P., Yiu, A.: Web Services Business Process Execution Language - Version 2.0. OASIS (January 2007)
-
(2007)
OASIS (January)
-
-
Alves, A.1
Arkin, A.2
Askary, S.3
Barreto, C.4
Bloch, B.5
Curbera, F.6
Ford, M.7
Goland, Y.8
Guizar, A.9
Kartha, N.10
Liu, C.K.11
Khalaf, R.12
Koenig, D.13
Marin, M.14
Mehta, V.15
Thatte, S.16
Van Der Rijn, D.17
Yendluri, P.18
Yiu, A.19
-
6
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
(February)
-
Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security (TISSEC) 2(1) (February 1999)
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
7
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
Botha, R.A., Elo., J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3) (2001)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
9
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
(February)
-
Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information and System Security (TISSEC) 2(1) (February 1999)
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.1
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
10
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
(August)
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security (TISSEC) 4(3) (August 2001)
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
0035790754
-
Flexible Team-Based Access Control Using Contexts
-
(May)
-
Georgiadis, C.K., Mavridis, I., Pangalos, G., Thomas, R.K.: Flexible Team-Based Access Control Using Contexts. In: Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT) (May 2001)
-
(2001)
Proc. of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
13
-
-
0016984825
-
Protection in operating systems
-
(August)
-
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of the ACM 19(8) (August 1976)
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
14
-
-
84902459113
-
Interactive access control for web services
-
Deswarte, Y., Cuppens, F., Jajodia, S., Wang L. (Eds.)
-
Koshutanski, H., Massacci, F.: Interactive access control for web services. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) IFIP 18th WorldComputer Congress, TC11 19th Int. Information Security Conference, pp. 151-166 (2004)
-
(2004)
IFIP 18th WorldComputer Congress, TC11 19th Int. Information Security Conference
, pp. 151-166
-
-
Koshutanski, H.1
Massacci, F.2
-
15
-
-
0019608720
-
Formal models for computer security
-
(September)
-
Landwehr, C.E.: Formal Models for Computer Security. ACM Computing Surveys 13(3) (September 1981)
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.3
-
-
Landwehr, C.E.1
-
16
-
-
70350087288
-
Process aware information systems: Bridging people and software through process technology
-
Wiley Publishing, Chichester
-
Mendling, J., zur Muehlen, M., Price, A.: Process Aware Information Systems: Bridging People and Software Through Process Technology. In: Standards for Workflow De.nition and Execution, pp. 281-316. Wiley Publishing, Chichester (2005)
-
(2005)
Standards for Workflow De.nition and Execution
, pp. 281-316
-
-
Mendling, J.1
Zur Muehlen, M.2
Price, A.3
-
17
-
-
10444269570
-
An approach to extract RBAC models from BPEL4WS processes
-
(June)
-
Mendling, J., Strembeck, M., Stermsek, G., Neumann, G.: An Approach to Extract RBAC Models from BPEL4WS Processes. In: Proc. of the 13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE) (June 2004)
-
(2004)
Proc. of the 13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE)
-
-
Mendling, J.1
Strembeck, M.2
Stermsek, G.3
Neumann, G.4
-
19
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
(February)
-
Osborn, S., Sandhu, R., Munawer, Q.: Con.guring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security (TISSEC) 3(2) (February 2000)
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.2
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
20
-
-
70350086918
-
Evaluation of the BPEL4People and WSHumanTask Extensions to WS-BPEL 2.0 using the workflow resource patterns
-
BPMcenter.org
-
Russell, N., van der Aalst, W.M.P.: Evaluation of the BPEL4People and WSHumanTask Extensions to WS-BPEL 2.0 using the Workflow Resource Patterns. BPM Center Report BPM-07-10, BPMcenter.org (2007)
-
(2007)
BPM Center Report BPM-07-10
-
-
Russell, N.1
Van Der Aalst, W.M.P.2
-
21
-
-
25144499038
-
Workflow resource patterns: Identification, representation and tool support
-
Pastor, Ó Falcao e Cunha J. (eds.). CAiSE 2005 Springer, Heidelberg
-
Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow resource patterns: Identi.cation, representation and tool support. In: Pastor, ́ O., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol.3520, pp. 216-232. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3520
, pp. 216-232
-
-
Russell, N.1
Van Der Aalst, W.M.P.2
Ter Hofstede, A.H.M.3
Edmond, D.4
-
22
-
-
0028513932
-
Access control: Principles and practice
-
(September)
-
Sandhu, R.S., Samarati, P.: Access control: Principles and practice. IEEE Communications 32(9) (September 1994)
-
(1994)
IEEE Communications
, vol.32
, Issue.9
-
-
Sandhu, R.S.1
Samarati, P.2
-
23
-
-
4444270398
-
Conffict checking of separation of duty constraints in RBAC - Implementation experiences
-
(February)
-
Strembeck, M.: Con.ict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences. In: Proc. of the Conference on Software Engineering (SE 2004) (February 2004)
-
(2004)
Proc. of the Conference on Software Engineering (SE 2004)
-
-
Strembeck, M.1
-
27
-
-
46849087573
-
User tasks and access control over web services
-
(July)
-
Thomas, J., Paci, F., Bertino, E., Eugster, P.: User Tasks and Access Control over Web Services. In: Proc. of the IEEE International Conference on Web Services (ICWS) (July 2007)
-
(2007)
Proc. of the IEEE International Conference on Web Services (ICWS)
-
-
Thomas, J.1
Paci, F.2
Bertino, E.3
Eugster, P.4
-
28
-
-
0031387996
-
Team-based access control (tmac): A primitive for applying role-based access controls in collaborative environments
-
Thomas, R.K.: Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. In: Proc. of the ACM Workshop on Role Based Access Control (1997)
-
(1997)
Proc. of the ACM Workshop on Role Based Access Control
-
-
Thomas, R.K.1
-
29
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
(August)
-
Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: Proc. of the IFIP WG11.3 Conference on Database Security (August 1997)
-
(1997)
Proc. of the IFIP WG11.3 Conference on Database Security
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
30
-
-
38049132539
-
Modeling of task-based authorization constraints in BPMN
-
Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. Springer, Heidelberg
-
Wolter, C., Schaad, A.: Modeling of Task-Based Authorization Constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol.4714, pp. 64-79. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4714
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
|