-
1
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Elisa Bertino, Elena Ferrari, and Vijay Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur., 2(1):65–104, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
2
-
-
0028016985
-
About the enforcement of state dependent security specifications
-
In T.F. Keefe and C.E. Landwehr, editors, Boston, etc, Kluwer
-
Joachim Biskup and Christian Eckert. About the enforcement of state dependent security specifications. In T.F. Keefe and C.E. Landwehr, editors, Database Security VII, pages 3–17, Boston, etc., 1994. Kluwer.
-
(1994)
Database Security
, vol.7
, pp. 3-17
-
-
Biskup, J.1
Eckert, C.2
-
4
-
-
84902439801
-
Administration rights in the sdsd-system
-
Sabrina De Capitani di Vimercati, Indrakshi Ray, and Indrajit Ray, editors, Kluwer
-
Joachim Biskup, Thomas Leineweber, and Jörg Parthe. Administration rights in the sdsd-system. In Sabrina De Capitani di Vimercati, Indrakshi Ray, and Indrajit Ray, editors, Data and Applications Security XVII: Status and Prospects, pages 149–162. Kluwer, 2004.
-
(2004)
Data and Applications Security XVII: Status and Prospects
, pp. 149-162
-
-
Biskup, J.1
Leineweber, T.2
Parthe, J.3
-
7
-
-
0035594917
-
Managing workflow authorization constraints through active database technology
-
Fabio Casati, Silvana Castano, and Maria Grazia Fugini. Managing workflow authorization constraints through active database technology. Information Systems Frontiers, 3(3):319–338, 2001.
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
, pp. 319-338
-
-
Casati, F.1
Castano, S.2
Fugini, M.G.3
-
8
-
-
8344220516
-
Towards web service access control
-
M. Coetzee and J.H.P. Eloff. Towards web service access control. Computers & Security, 23(7):559–570, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 559-570
-
-
Coetzee, M.1
Eloff, J.H.P.2
-
9
-
-
84957800033
-
Towards measuring anonymity
-
Roger Dingledine and Paul Syverson, editors, Berlin Heidelberg, Springer
-
Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In Roger Dingledine and Paul Syverson, editors, Privacy Enhancing Technologies 2002, LNCS, pages 54–68, Berlin Heidelberg, 2003. Springer.
-
(2003)
Privacy Enhancing Technologies 2002, LNCS
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
10
-
-
33745883087
-
-
version v0.23
-
Marit Hansen and Andreas Pfitzmann. Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. version v0.23. http://dud.inf.tu-dresden.de/Literatur V1.shtml, 2005.
-
(2005)
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - a Consolidated Proposal for Terminology.
-
-
Hansen, M.1
Pfitzmann, A.2
-
14
-
-
0038825675
-
Task-role-based access control model
-
September
-
Sejong Oh and Seog Park. Task-role-based access control model. Information Systems, 28(6):533–562, September 2003.
-
(2003)
Information Systems
, vol.28
, Issue.6
, pp. 533-562
-
-
Sejong, O.1
Park, S.2
-
15
-
-
4243121778
-
Facilitating cross-organisational workflows with a workflow view approach
-
Karsten A. Schulz and Maria E. Orlowska. Facilitating cross-organisational workflows with a workflow view approach. Data & Knowledge Engineering, 51(1):109– 147, 2004.
-
(2004)
Data & Knowledge Engineering
, vol.51
, Issue.1
-
-
Schulz, K.A.1
Orlowska, M.E.2
-
16
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Roger Dingledine and Paul Syverson, editors, Berlin Heidelberg, Springer
-
Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In Roger Dingledine and Paul Syverson, editors, Privacy Enhancing Technologies 2002, LNCS, pages 41–53, Berlin Heidelberg, 2003. Springer.
-
(2003)
Privacy Enhancing Technologies 2002, LNCS
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
18
-
-
0032064779
-
Information infrastructure for electronic virtual organization management
-
Troy J. Strader, Fu-Ren Lin, and Michael J. Shaw. Information infrastructure for electronic virtual organization management. Decision Support Systems, 23:75–94, 1998.
-
(1998)
Decision Support Systems
, vol.23
, pp. 75-94
-
-
Strader, T.J.1
Lin, F.-R.2
Shaw, M.J.3
-
19
-
-
77953869067
-
Pres: A practical flexible rbac workflow system
-
New York, NY, USA,. ACM Press
-
Yuqing Sun and Peng Pan. Pres: a practical flexible rbac workflow system. In ICEC ’05: Proceedings of the 7th International Conference on Electronic Commerce, pages 653–658, New York, NY, USA, 2005. ACM Press.
-
(2005)
ICEC ’05: Proceedings of the 7Th International Conference on Electronic Commerce
, pp. 653-658
-
-
Sun, Y.1
Pan, P.2
-
20
-
-
0348209180
-
W-rbac – a workflow security model incorporating controlled overriding of constraints
-
Jacques Wainer, Paulo Barthelmess, and Akhil Kumar. W-rbac – a workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems, 12(4):455–485, 2003.
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
22
-
-
0036161253
-
Amit Sheth, John Miller, and Zongwei Luo. Authorization and access control of application data in workflow systems
-
Shengli Wu, Amit Sheth, John Miller, and Zongwei Luo. Authorization and access control of application data in workflow systems. J. Intell. Inf. Syst., 18(1):71–94, 2002.
-
(2002)
J. Intell. Inf. Syst.
, vol.18
, Issue.1
, pp. 71-94
-
-
Shengli, W.1
-
23
-
-
23044532795
-
Trust-based security model and enforcement mechanism for web service technology
-
Springer
-
S. Yang, H. Lam, and S. Y. W. Su. Trust-based security model and enforcement mechanism for web service technology. In Technologies for E-Services. Third International Workshop, TES 2002., pages 151–160. Springer, 2002.
-
(2002)
Technologies for E-Services. Third International Workshop, TES 2002
, pp. 151-160
-
-
Yang, S.1
Lam, H.2
Su, S.Y.W.3
|