메뉴 건너뛰기




Volumn , Issue , 1999, Pages 83-94

SecureFlow: A Secure Web-enabled Workflow Management System

Author keywords

[No Author keywords available]

Indexed keywords

AUTHORIZATION; WORKFLOW MANAGEMENT;

EID: 77952749389     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/319171.319179     Document Type: Conference Paper
Times cited : (74)

References (16)
  • 3
    • 85134027293 scopus 로고    scopus 로고
    • A Petri Net Based Safety Analysis of Workflow Authorization Models
    • to appear
    • Vijayalakshmi Atluri and Wei-Kuang Huang. A Petri Net Based Safety Analysis of Workflow Authorization Models. Journal of Computer Security, to appear, 1999.
    • (1999) Journal of Computer Security
    • Atluri, V.1    Huang, W.-K.2
  • 4
    • 0031382313 scopus 로고    scopus 로고
    • A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems
    • November
    • Elisa Bertirio, Elena Ferrari, and Vijayalakshmi Atluri. A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems. In Proc. of the 2nd ACM Workshop on Role-based Access Control, November 1997.
    • (1997) Proc. of the 2nd ACM Workshop on Role-based Access Control
    • Bertirio, E.1    Ferrari, E.2    Atluri, V.3
  • 5
    • 33746315090 scopus 로고    scopus 로고
    • A new generation of workflow management systems: Beyond taylorism with mobile
    • C. Bussier, S. Jablonski, and H. Schuster. A new generation of workflow management systems: Beyond taylorism with mobile. ACM SIGOIS Bulletin, 17(1):17-20, 1996.
    • (1996) ACM SIGOIS Bulletin , vol.17 , Issue.1 , pp. 17-20
    • Bussier, C.1    Jablonski, S.2    Schuster, H.3
  • 6
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland, California, April
    • David D. Clark and David R. Wilson. A comparison of commercial and military computer security policies. In Proc. IEEE Symposium on Security and Privacy, pages 184-194, Oakland, California, April 1987.
    • (1987) Proc. IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 7
    • 85031465405 scopus 로고    scopus 로고
    • Workflow technologies meet the internet
    • Asuman Dogac, Leonid Kalinichenko, M. Tamer Ozsu, and Amit Sheth, editors NATO Advanced Study Institute
    • Umeshwar Dayal, Qiming Chen, and Tak W. Yan. Workflow technologies meet the internet. In Asuman Dogac, Leonid Kalinichenko, M. Tamer Ozsu, and Amit Sheth, editors, Advances in Workflow Management Systems and interoperability, pages 343-358. NATO Advanced Study Institute, 1997.
    • (1997) Advances in Workflow Management Systems and interoperability , pp. 343-358
    • Dayal, U.1    Chen, Q.2    Yan, T.W.3
  • 8
    • 56649087933 scopus 로고    scopus 로고
    • The workflow management system panta rhei
    • Asuman Dogac, Leonid Kalinichenko, M. Tamer Ozsu, and Amit Sheth, editors NATO Advanced Study Institute
    • Johann Eder, Herbert Groiss, and Walter Liebhart. The workflow management system panta rhei. In Asuman Dogac, Leonid Kalinichenko, M. Tamer Ozsu, and Amit Sheth, editors, Advances in Workflow Management Systems and interoperability, pages 129-144. NATO Advanced Study Institute, 1997.
    • (1997) Advances in Workflow Management Systems and interoperability , pp. 129-144
    • Eder, J.1    Groiss, H.2    Liebhart, W.3
  • 13
    • 0003342146 scopus 로고
    • Separation of Duties in Computerized Information Systems
    • Sushil Jajodia and Carl Landwehr, editors North Holland
    • Ravi S. Sandhu. Separation of Duties in Computerized Information Systems. In Sushil Jajodia and Carl Landwehr, editors, Database Security, IV: Status and Prospects, pages 179-189. North Holland, 1991.
    • (1991) Database Security, IV: Status and Prospects , pp. 179-189
    • Sandhu, R.S.1
  • 14
    • 0030086382 scopus 로고    scopus 로고
    • Role-based Access Control Models
    • February
    • Ravi S. Sandhu et al. Role-based Access Control Models. IEEE Computer, pages 38-47, February 1996.
    • (1996) IEEE Computer , pp. 38-47
    • Sandhu, R.S.1
  • 15
    • 85134005718 scopus 로고    scopus 로고
    • Hp workflow research: Past, present, and future
    • Asuman Dogac, Leonid Kalinichenko, M. Tamer Ozsu, and Amit Sheth, editors NATO Advanced Study Institute
    • Ming-Chien Shan, Jim Davis, Weimin Du, and ting Huang. Hp workflow research: Past, present, and future. In Asuman Dogac, Leonid Kalinichenko, M. Tamer Ozsu, and Amit Sheth, editors, Advances in Workflow Management Systems and interoperab ility, pages 91-105. NATO Advanced Study Institute, 1997.
    • (1997) Advances in Workflow Management Systems and interoperab ility , pp. 91-105
    • Shan, M.-C.1    Davis, J.2    Du, W.3    Huang, T.4
  • 16
    • 33645625224 scopus 로고    scopus 로고
    • The wasa approach to workflow management for scientific applications
    • Asuman Dogac, Leonid Kalinichenko, M. Tamer Ozsu, and Amit Sheth, editors NATO Advanced Study Institute
    • Gottfried Vossen and Mathias Weske. The wasa approach to workflow management for scientific applications. In Asuman Dogac, Leonid Kalinichenko, M. Tamer Ozsu, and Amit Sheth, editors, Advances in Workflow Management Systems and interoperability, pages 145-165. NATO Advanced Study Institute, 1997.
    • (1997) Advances in Workflow Management Systems and interoperability , pp. 145-165
    • Vossen, G.1    Weske, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.