-
1
-
-
11144352941
-
Organizational Management in Workflow Applications-Issues and Perspectives
-
Zur Muehlen, M.: Organizational Management in Workflow Applications-Issues and Perspectives. Inf. Technol. and Management 5(3-4), 271-291 (2004)
-
(2004)
Inf. Technol. and Management
, vol.5
, Issue.3-4
, pp. 271-291
-
-
Zur Muehlen, M.1
-
2
-
-
34250753855
-
Intentional Access Management: Making Access Control Usable for End-Users
-
ACM Press, New York
-
Cao, X., Iverson, L.: Intentional Access Management: Making Access Control Usable for End-Users. In: SOUPS 2006: Proceedings of the second symposium on Usable privacy and security, vol. 2, pp. 20-31. ACM Press, New York (2006)
-
(2006)
SOUPS 2006: Proceedings of the second symposium on Usable privacy and security
, vol.2
, pp. 20-31
-
-
Cao, X.1
Iverson, L.2
-
3
-
-
3042692320
-
A model for team-based access control (tmac 2004)
-
Washington, DC, USA, p, IEEE Computer Society, Los Alamitos
-
Alotaiby, F.T., Chen, J.X.: A model for team-based access control (tmac 2004). In: ITCC 2004: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004), Washington, DC, USA, p. 450. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
ITCC 2004: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC
, pp. 450
-
-
Alotaiby, F.T.1
Chen, J.X.2
-
4
-
-
0038825675
-
Task-role-based access control model
-
Oh, S., Park, S.: Task-role-based access control model. Inf. Syst. 28(6), 533-562 (2003)
-
(2003)
Inf. Syst
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
5
-
-
20444479906
-
A logic-based framework for attribute based access control
-
ACM, New York
-
Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: FMSE 2004: Proceedings of the 2004 ACM workshop on Formal methods in security engineering, pp. 45-55. ACM, New York (2004)
-
(2004)
FMSE 2004: Proceedings of the 2004 ACM workshop on Formal methods in security engineering
, pp. 45-55
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
7
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
ACM, New York
-
Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: SACMAT 2006: ACM symposium on Access control models and technologies, pp. 139-149. ACM, New York (2006)
-
(2006)
SACMAT 2006: ACM symposium on Access control models and technologies
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
9
-
-
57349111770
-
Task-based entailment constraints for basic workflow patterns
-
ACM, New York
-
Wolter, C., Schaad, A., Meinel, C.: Task-based entailment constraints for basic workflow patterns. In: SACMAT 2008: Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 51-60. ACM, New York (2008)
-
(2008)
SACMAT 2008: Proceedings of the 13th ACM symposium on Access control models and technologies
, pp. 51-60
-
-
Wolter, C.1
Schaad, A.2
Meinel, C.3
-
10
-
-
0016555241
-
The Protection of Information in Computer Systems
-
IEEE Computer Society Press, Los Alamitos
-
Saltzer, J.H., Schroeder, M.D.: The Protection of Information in Computer Systems. In: Proc. IEEE, vol. 63, pp. 1278-1308. IEEE Computer Society Press, Los Alamitos (1975)
-
(1975)
Proc. IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
11
-
-
4944250730
-
-
Tan, K., Crampton, J., Gunter, C.A.: The Consistency of Task-Based Authorization Constraints in Workflow Systems. In: CSFW, p. 155- (2004)
-
Tan, K., Crampton, J., Gunter, C.A.: The Consistency of Task-Based Authorization Constraints in Workflow Systems. In: CSFW, p. 155- (2004)
-
-
-
-
12
-
-
38049066016
-
Satisfiability and Resiliency in Workflow Systems
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Wang, Q., Li, N.: Satisfiability and Resiliency in Workflow Systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 90-105. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 90-105
-
-
Wang, Q.1
Li, N.2
-
13
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
14
-
-
34249933531
-
Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems
-
Jensen, K., Kristensen, L., Wells, L.: Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems. International Journal on Software Tools for Technology Transfer (STTT) 9(3), 213-254 (2007)
-
(2007)
International Journal on Software Tools for Technology Transfer (STTT)
, vol.9
, Issue.3
, pp. 213-254
-
-
Jensen, K.1
Kristensen, L.2
Wells, L.3
-
15
-
-
34247861351
-
A static compliance-checking framework for business process models
-
Liu, Y., Mueller, S., Xu, K.: A static compliance-checking framework for business process models. IBM Syst. J. 46(2), 335-361 (2007)
-
(2007)
IBM Syst. J
, vol.46
, Issue.2
, pp. 335-361
-
-
Liu, Y.1
Mueller, S.2
Xu, K.3
-
16
-
-
57049136576
-
-
Awad, A., Decker, G.,Weske, M.: Efficient Compliance Checking Using BPMN-Q and Temporal Logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, 5240, pp. 326-341. Springer, Heidelberg (2008)
-
Awad, A., Decker, G.,Weske, M.: Efficient Compliance Checking Using BPMN-Q and Temporal Logic. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 326-341. Springer, Heidelberg (2008)
-
-
-
-
19
-
-
25144499038
-
-
Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, O., Falcao e Cunha, J. (eds.) CAiSE 2005. LNCS, 3520, pp. 216-232. Springer, Heidelberg (2005)
-
Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, O., Falcao e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 216-232. Springer, Heidelberg (2005)
-
-
-
-
20
-
-
33750014264
-
-
Wohed, P., van der Aalst, W.M.P., Dumas, M., ter Hofstede, A.H.M., Russell, N.: On the Suitability of BPMN for Business Process Modelling. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, 4102, pp. 161-176. Springer, Heidelberg (2006)
-
Wohed, P., van der Aalst, W.M.P., Dumas, M., ter Hofstede, A.H.M., Russell, N.: On the Suitability of BPMN for Business Process Modelling. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 161-176. Springer, Heidelberg (2006)
-
-
-
-
21
-
-
0034810791
-
Separation of Duties for Access Control Enforcement inWorkflow Environments
-
Botha, R.A., Eloff, J.H.P.: Separation of Duties for Access Control Enforcement inWorkflow Environments. IBM System Journal 40(3), 666-682 (2001)
-
(2001)
IBM System Journal
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
22
-
-
38049132539
-
-
Wolter, C., Schaad, A.: Modelling of Task-Based Authorization Constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, 4714, pp. 64-79. Springer, Heidelberg (2007)
-
Wolter, C., Schaad, A.: Modelling of Task-Based Authorization Constraints in BPMN. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 64-79. Springer, Heidelberg (2007)
-
-
-
-
23
-
-
38049150939
-
-
Sadiq,W.S., Governatori, G., Namiri, K.: Modeling Control Objectives for Business Process Compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, 4714, pp. 149-164. Springer, Heidelberg (2007)
-
Sadiq,W.S., Governatori, G., Namiri, K.: Modeling Control Objectives for Business Process Compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149-164. Springer, Heidelberg (2007)
-
-
-
-
24
-
-
44849127247
-
Lectures on Concurrency and Petri Nets
-
Desel, J, Reisig, W, Rozenberg, G, eds, Springer, Heidelberg
-
Desel, J., Reisig, W., Rozenberg, G. (eds.): Lectures on Concurrency and Petri Nets. LNCS, vol. 3098. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3098
-
-
-
25
-
-
38349016157
-
Formal semantics and analysis of bpmn process models
-
Technical report, Queensland University of Technology
-
Dijkman, R.M., Dumas, M., Ouyang, C.: Formal semantics and analysis of bpmn process models. Technical report, Queensland University of Technology (2007)
-
(2007)
-
-
Dijkman, R.M.1
Dumas, M.2
Ouyang, C.3
-
27
-
-
34250718156
-
Formal semantics and analysis of control flow in ws-bpel
-
Ouyang, C., Verbeek, E., van der Aalst, W.M.P., Breutel, S., Dumas, M., ter Hofstede, A.H.M.: Formal semantics and analysis of control flow in ws-bpel. Sci. Comput. Program. 67(2-3), 162-198 (2007)
-
(2007)
Sci. Comput. Program
, vol.67
, Issue.2-3
, pp. 162-198
-
-
Ouyang, C.1
Verbeek, E.2
van der Aalst, W.M.P.3
Breutel, S.4
Dumas, M.5
ter Hofstede, A.H.M.6
-
28
-
-
33749414793
-
Exploiting Hierarchical CP-Nets to Increase the Reliability of Web Services Workflow
-
IEEE Computer Society Press, Los Alamitos
-
Yang, Y., Tan, Q., Xiao, Y., Yu, J., Liu, F.: Exploiting Hierarchical CP-Nets to Increase the Reliability of Web Services Workflow. In: SAINT 2006: Proceedings of the International Symposium on Applications on Internet, pp. 116-122. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
SAINT 2006: Proceedings of the International Symposium on Applications on Internet
, pp. 116-122
-
-
Yang, Y.1
Tan, Q.2
Xiao, Y.3
Yu, J.4
Liu, F.5
-
29
-
-
30844469504
-
-
Nakajima, Shin: Lightweight formal analysis of Web service flows. Progress in informatics: PI 2, 57-76 (2005)
-
Nakajima, Shin: Lightweight formal analysis of Web service flows. Progress in informatics: PI 2, 57-76 (2005)
-
-
-
-
30
-
-
19944405131
-
Analysis of interacting BPEL web services
-
ACMPress, New York
-
Fu, X., Bultan, T., Su, J.: Analysis of interacting BPEL web services. In: WWW 2004: Proceedings of the 13th international conference onWorldWideWeb, pp. 621-630. ACMPress, New York (2004)
-
(2004)
WWW 2004: Proceedings of the 13th international conference onWorldWideWeb
, pp. 621-630
-
-
Fu, X.1
Bultan, T.2
Su, J.3
-
31
-
-
17644389760
-
Model checking XML manipulating software
-
ACM, New York
-
Fu, X., Bultan, T., Su, J.: Model checking XML manipulating software. In: ISSTA 2004: Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, pp. 252-262. ACM, New York (2004)
-
(2004)
ISSTA 2004: Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis
, pp. 252-262
-
-
Fu, X.1
Bultan, T.2
Su, J.3
-
32
-
-
33644505764
-
-
Fisteus, J.A., Fernandez, L.S., Kloos, C.D.: Applying model checking to BPEL4WS business collaborations. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 826-830. Springer, Heidelberg (2006)
-
Fisteus, J.A., Fernandez, L.S., Kloos, C.D.: Applying model checking to BPEL4WS business collaborations. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 826-830. Springer, Heidelberg (2006)
-
-
-
-
33
-
-
33749984776
-
-
Xiangpeng, Z., Cerone, A., Krishnan, P.: Verifying BPEL Workflows Under Authorisation Constraints. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, 4102, pp. 439-444. Springer, Heidelberg (2006)
-
Xiangpeng, Z., Cerone, A., Krishnan, P.: Verifying BPEL Workflows Under Authorisation Constraints. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol. 4102, pp. 439-444. Springer, Heidelberg (2006)
-
-
-
-
34
-
-
70350684888
-
Model-based Testing of Access Control Systems that Employ RBAC Policies
-
BPM, Springer, Heidelberg
-
Masood, A., Bhatti, R., Ghafoor, A., Mathur, A.: Model-based Testing of Access Control Systems that Employ RBAC Policies. In: BPM 2006. LNCS, pp. 439-444. Springer, Heidelberg (2006)
-
(2006)
LNCS
, pp. 439-444
-
-
Masood, A.1
Bhatti, R.2
Ghafoor, A.3
Mathur, A.4
-
35
-
-
70350693722
-
-
Huang, W.-k., Atluri, V.: SecureFlow: A Secure Web-Enabled Workflow Management System. In: ACM Workshop on Role-Based Access Control, pp. 83-94 (1999)
-
Huang, W.-k., Atluri, V.: SecureFlow: A Secure Web-Enabled Workflow Management System. In: ACM Workshop on Role-Based Access Control, pp. 83-94 (1999)
-
-
-
|