메뉴 건너뛰기




Volumn 4332 LNCS, Issue , 2006, Pages 86-100

Optimistic anonymous participation in inter-organizational workflow instances

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SYSTEMS; INFORMATION USE; NETWORK SECURITY;

EID: 74549139700     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11961635_6     Document Type: Conference Paper
Times cited : (3)

References (23)
  • 1
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Elisa Bertino, Elena Ferrari, and Vijay Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur., 2(1):65–104, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 2
    • 0028016985 scopus 로고
    • About the enforcement of state dependent security specifications
    • In T.F. Keefe and C.E. Landwehr, editors, Boston, etc, Kluwer
    • Joachim Biskup and Christian Eckert. About the enforcement of state dependent security specifications. In T.F. Keefe and C.E. Landwehr, editors, Database Security VII, pages 3–17, Boston, etc., 1994. Kluwer.
    • (1994) Database Security , vol.7 , pp. 3-17
    • Biskup, J.1    Eckert, C.2
  • 4
    • 84902439801 scopus 로고    scopus 로고
    • Administration rights in the sdsd-system
    • Sabrina De Capitani di Vimercati, Indrakshi Ray, and Indrajit Ray, editors, Kluwer
    • Joachim Biskup, Thomas Leineweber, and Jörg Parthe. Administration rights in the sdsd-system. In Sabrina De Capitani di Vimercati, Indrakshi Ray, and Indrajit Ray, editors, Data and Applications Security XVII: Status and Prospects, pages 149–162. Kluwer, 2004.
    • (2004) Data and Applications Security XVII: Status and Prospects , pp. 149-162
    • Biskup, J.1    Leineweber, T.2    Parthe, J.3
  • 7
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • Fabio Casati, Silvana Castano, and Maria Grazia Fugini. Managing workflow authorization constraints through active database technology. Information Systems Frontiers, 3(3):319–338, 2001.
    • (2001) Information Systems Frontiers , vol.3 , Issue.3 , pp. 319-338
    • Casati, F.1    Castano, S.2    Fugini, M.G.3
  • 8
    • 8344220516 scopus 로고    scopus 로고
    • Towards web service access control
    • M. Coetzee and J.H.P. Eloff. Towards web service access control. Computers & Security, 23(7):559–570, 2004.
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 559-570
    • Coetzee, M.1    Eloff, J.H.P.2
  • 9
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Roger Dingledine and Paul Syverson, editors, Berlin Heidelberg, Springer
    • Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In Roger Dingledine and Paul Syverson, editors, Privacy Enhancing Technologies 2002, LNCS, pages 54–68, Berlin Heidelberg, 2003. Springer.
    • (2003) Privacy Enhancing Technologies 2002, LNCS , pp. 54-68
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 14
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • September
    • Sejong Oh and Seog Park. Task-role-based access control model. Information Systems, 28(6):533–562, September 2003.
    • (2003) Information Systems , vol.28 , Issue.6 , pp. 533-562
    • Sejong, O.1    Park, S.2
  • 15
    • 4243121778 scopus 로고    scopus 로고
    • Facilitating cross-organisational workflows with a workflow view approach
    • Karsten A. Schulz and Maria E. Orlowska. Facilitating cross-organisational workflows with a workflow view approach. Data & Knowledge Engineering, 51(1):109– 147, 2004.
    • (2004) Data & Knowledge Engineering , vol.51 , Issue.1
    • Schulz, K.A.1    Orlowska, M.E.2
  • 16
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • Roger Dingledine and Paul Syverson, editors, Berlin Heidelberg, Springer
    • Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In Roger Dingledine and Paul Syverson, editors, Privacy Enhancing Technologies 2002, LNCS, pages 41–53, Berlin Heidelberg, 2003. Springer.
    • (2003) Privacy Enhancing Technologies 2002, LNCS , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 18
    • 0032064779 scopus 로고    scopus 로고
    • Information infrastructure for electronic virtual organization management
    • Troy J. Strader, Fu-Ren Lin, and Michael J. Shaw. Information infrastructure for electronic virtual organization management. Decision Support Systems, 23:75–94, 1998.
    • (1998) Decision Support Systems , vol.23 , pp. 75-94
    • Strader, T.J.1    Lin, F.-R.2    Shaw, M.J.3
  • 20
    • 0348209180 scopus 로고    scopus 로고
    • W-rbac – a workflow security model incorporating controlled overriding of constraints
    • Jacques Wainer, Paulo Barthelmess, and Akhil Kumar. W-rbac – a workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems, 12(4):455–485, 2003.
    • (2003) International Journal of Cooperative Information Systems , vol.12 , Issue.4 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3
  • 22
    • 0036161253 scopus 로고    scopus 로고
    • Amit Sheth, John Miller, and Zongwei Luo. Authorization and access control of application data in workflow systems
    • Shengli Wu, Amit Sheth, John Miller, and Zongwei Luo. Authorization and access control of application data in workflow systems. J. Intell. Inf. Syst., 18(1):71–94, 2002.
    • (2002) J. Intell. Inf. Syst. , vol.18 , Issue.1 , pp. 71-94
    • Shengli, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.