-
1
-
-
67249093794
-
Towards Object-aware Process Management Systems: Issues, Challenges, Benefits
-
LNBIP, Springer, Heidelberg
-
Künzle, V., Reichert, M.: Towards Object-aware Process Management Systems: Issues, Challenges, Benefits. In: Proc. BPMDS 2009. LNBIP, vol. 29, pp. 197-210. Springer, Heidelberg (2009)
-
(2009)
Proc. BPMDS 2009
, vol.29
, pp. 197-210
-
-
Künzle, V.1
Reichert, M.2
-
2
-
-
84884311106
-
Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
-
Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. Inf. Syst. Secur. 3(2), 85-106 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
3
-
-
0002848811
-
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
0030086382
-
Role-based Access Control Models
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based Access Control Models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
6
-
-
0037411286
-
Workflow Patterns
-
Aalst, W., Hofstede, A., Kiepuszewski, B., Barros, A.: Workflow Patterns. Distr. & Parallel Databases 14, 5-51 (2003)
-
(2003)
Distr. & Parallel Databases
, vol.14
, pp. 5-51
-
-
Aalst, W.1
Hofstede, A.2
Kiepuszewski, B.3
Barros, A.4
-
7
-
-
38149033667
-
A Formal Framework for Adaptive Access Control Models
-
Spaccapietra, S., Atzeni, P., Fages, F., Hacid, M.-S., Kifer, M., Mylopoulos, J., Pernici, B., Shvaiko, P., Trujillo, J., Zaihrayeu, I. (eds.) Journal on Data Semantics IX. Springer, Heidelberg
-
Rinderle-Ma, S., Manfred, R.: A Formal Framework for Adaptive Access Control Models. In: Spaccapietra, S., Atzeni, P., Fages, F., Hacid, M.-S., Kifer, M., Mylopoulos, J., Pernici, B., Shvaiko, P., Trujillo, J., Zaihrayeu, I. (eds.) Journal on Data Semantics IX. LNCS, vol. 4601, pp. 82-112. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4601
, pp. 82-112
-
-
Rinderle-Ma, S.1
Manfred, R.2
-
8
-
-
11144308857
-
Case handling: A new paradigm for business process support
-
DOI 10.1016/j.datak.2004.07.003, PII S0169023X04001296
-
Aalst, W., Weske, M., Grünbauer, D.: Case Handling: A new paradigm for business process support. Data and Knowledge Engineering 53(2), 129-162 (2005) (Pubitemid 40034560)
-
(2005)
Data and Knowledge Engineering
, vol.53
, Issue.2
, pp. 129-162
-
-
Van Der Aalst, W.M.P.1
Weske, M.2
Grunbauer, D.3
-
9
-
-
0042429112
-
Product-based Workflow Design
-
Reijers, H., Liman, S., Aalst, W.: Product-based Workflow Design. Management Information Systems 20(1), 229-262 (2003)
-
(2003)
Management Information Systems
, vol.20
, Issue.1
, pp. 229-262
-
-
Reijers, H.1
Liman, S.2
Aalst, W.3
-
10
-
-
38349070244
-
Data-driven Modeling and Coordination of Large Process Structures
-
Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. Springer, Heidelberg
-
Müller, D., Reichert, M., Herbst, J.: Data-driven Modeling and Coordination of Large Process Structures. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. LNCS, vol. 4803, pp. 131-149. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4803
, pp. 131-149
-
-
Müller, D.1
Reichert, M.2
Herbst, J.3
-
11
-
-
84957029150
-
Workflow Modeling using Proclets
-
Scheuermann, P., Etzion, O. (eds.) CoopIS 2000. Springer, Heidelberg
-
Aalst,W., Barthelmess, P., Ellis, C.,Wainer, J.:Workflow Modeling using Proclets. In: Scheuermann, P., Etzion, O. (eds.) CoopIS 2000. LNCS, vol. 1901, pp. 198-209. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1901
, pp. 198-209
-
-
Aalst, W.1
Barthelmess, P.2
Ellis, C.3
Wainer, J.4
-
12
-
-
84884639998
-
When workflows will not deliver: The case of contradicting work practice
-
Sadiq, S., Orlowska, M., Sadiq, W., Schulz, K.: When workflows will not deliver: The case of contradicting work practice. In: Proc. BIS 2005 (2005)
-
Proc. BIS 2005 (2005)
-
-
Sadiq, S.1
Orlowska, M.2
Sadiq, W.3
Schulz, K.4
-
13
-
-
0032027672
-
Data security
-
Bertino, E.: Data security. Data Knowl. Eng. 25(1-2), 199-216 (1998)
-
(1998)
Data Knowl. Eng.
, vol.25
, Issue.1-2
, pp. 199-216
-
-
Bertino, E.1
-
15
-
-
84964853055
-
Access Control: Policies, Models and Mechanisms
-
Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. Springer, Heidelberg
-
Samarati, P., Vimercati, S.: Access Control: Policies, Models and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, p. 137. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2171
, pp. 137
-
-
Samarati, P.1
Vimercati, S.2
-
17
-
-
33646676768
-
Balancing Flexibility and Security in Adaptive Process Management Systems
-
Meersman, R., Tari, Z. (eds.) OTM 2005. Springer, Heidelberg
-
Weber, B., Reichert, M., Wild, W., Rinderle, S.: Balancing Flexibility and Security in Adaptive Process Management Systems. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol. 3760, pp. 59-76. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3760
, pp. 59-76
-
-
Weber, B.1
Reichert, M.2
Wild, W.3
Rinderle, S.4
-
18
-
-
77953963972
-
Modellierung der Aufbauorganisation in Workflow- Management-Systemen: Kritische Bestandsaufnahme und Gestaltungsvorschläge
-
Rosemann, M., Mühlen, M.: Modellierung der Aufbauorganisation in Workflow- Management-Systemen: Kritische Bestandsaufnahme und Gestaltungsvorschläge. EMISA Forum 3(1), 78-86 (1998)
-
(1998)
EMISA Forum
, vol.3
, Issue.1
, pp. 78-86
-
-
Rosemann, M.1
Mühlen, M.2
-
19
-
-
11144352941
-
Organizational Management in Workflow Applications: Issues and Perspectives
-
Rosemann, M., Mühlen, M.: Organizational Management in Workflow Applications: Issues and Perspectives. Inf. Technol. and Mgmt. 5(3-4), 271-291 (2004)
-
(2004)
Inf. Technol. and Mgmt.
, vol.5
, Issue.3-4
, pp. 271-291
-
-
Rosemann, M.1
Mühlen, M.2
-
21
-
-
84863273586
-
A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications
-
Hu, J., Weaver, A.: A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications. In: Proc. PSPT 2004 (2004)
-
Proc. PSPT 2004 (2004)
-
-
Hu, J.1
Weaver, A.2
-
22
-
-
15944413918
-
Context Sensitivity in Role-based Access Control
-
Kumar, A., Karnik, N., Chafle, G.: Context Sensitivity in Role-based Access Control. SIGOPS 36(3), 53-66 (2002)
-
(2002)
SIGOPS
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.2
Chafle, G.3
-
23
-
-
0347380552
-
Supporting Relationships in Access Control Using Role Based Access Control
-
Barkley, J., Beznosov, K., Uppal, J.: Supporting Relationships in Access Control Using Role Based Access Control. In: Proc. RBAC 1999, pp. 55-65 (1999)
-
(1999)
Proc. RBAC 1999
, pp. 55-65
-
-
Barkley, J.1
Beznosov, K.2
Uppal, J.3
-
24
-
-
37649012775
-
Modeling Business Contexture and Behavior Using Business Artifacts
-
Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. Springer, Heidelberg
-
Liu, R., Bhattacharya, K., Wu, F.: Modeling Business Contexture and Behavior Using Business Artifacts. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. LNCS, vol. 4495, pp. 324-339. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4495
, pp. 324-339
-
-
Liu, R.1
Bhattacharya, K.2
Wu, F.3
-
25
-
-
45849134543
-
Product-based Workow Support: Dynamic Workow Execution
-
Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. Springer, Heidelberg
-
Vanderfeesten, I.T.P., Reijers, H.A., van der Aalst, W.M.P.: Product-based Workow Support: Dynamic Workow Execution. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 571-574. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5074
, pp. 571-574
-
-
Vanderfeesten, I.T.P.1
Reijers, H.A.2
Van Der Aalst, W.M.P.3
-
26
-
-
45849109580
-
A New Paradigm for the Enactment and Dynamic Adaptation of Data-driven Process Structures
-
Bellahsëne, Z., Léonard, M. (eds.) CAiSE 2008. Springer, Heidelberg
-
Müller, D., Reichert, M., Herbst, J.: A New Paradigm for the Enactment and Dynamic Adaptation of Data-driven Process Structures. In: Bellahsëne, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 48-63. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5074
, pp. 48-63
-
-
Müller, D.1
Reichert, M.2
Herbst, J.3
-
27
-
-
0002841051
-
Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management
-
Sandhu, R., Thomas, R.: Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In: Proc. IFIP 1997, pp. 166-181 (1997)
-
(1997)
Proc. IFIP 1997
, pp. 166-181
-
-
Sandhu, R.1
Thomas, R.2
-
28
-
-
0036161253
-
Authorization and access control of application data in workflow systems
-
DOI 10.1023/A:1012972608697
-
Wu, S., Sheth, A., Miller, J., Luo, Z.: Authorization and Access Control Of Application Data In Workflow-Systems. JIIS 18, 71-94 (2002) (Pubitemid 34129948)
-
(2002)
Journal of Intelligent Information Systems
, vol.18
, Issue.1
, pp. 71-94
-
-
Wu, S.1
Sheth, A.2
Miller, J.3
Luo, Z.4
-
29
-
-
0031373615
-
A Policy Based Role Object Model
-
Lupu, E., Sloman, M.: A Policy Based Role Object Model. In: Proc. EDOC 1997, pp. 36-47 (1997)
-
(1997)
Proc. EDOC 1997
, pp. 36-47
-
-
Lupu, E.1
Sloman, M.2
-
30
-
-
0031387996
-
Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments
-
Thomas, R.: Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. In: Proc. RBAC 1997, pp. 13-19 (1997)
-
(1997)
Proc. RBAC 1997
, pp. 13-19
-
-
Thomas, R.1
-
31
-
-
25144499038
-
Workflow Resource Patterns
-
Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. Springer, Heidelberg
-
Russell, N., Hofstede, A., Edmond, D.: Workflow Resource Patterns. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 216-232. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3520
, pp. 216-232
-
-
Russell, N.1
Hofstede, A.2
Edmond, D.3
-
32
-
-
0348209180
-
W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints
-
Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints. IJCIS 12 (2003)
-
(2003)
IJCIS
, vol.12
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
|