메뉴 건너뛰기




Volumn 43 LNBIP, Issue , 2010, Pages 29-41

Integrating users in object-aware process management systems: Issues and challenges

Author keywords

Access Control; Data driven Processes; Human Aspects; Object aware Process Management; Process Design Methods

Indexed keywords

ACCESS CONTROL; COMPUTER SYSTEM RECOVERY; ENTERPRISE RESOURCE MANAGEMENT; PROCESS DESIGN; SECURITY SYSTEMS; WORK SIMPLIFICATION;

EID: 77953991389     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-12186-9_4     Document Type: Conference Paper
Times cited : (23)

References (32)
  • 1
    • 67249093794 scopus 로고    scopus 로고
    • Towards Object-aware Process Management Systems: Issues, Challenges, Benefits
    • LNBIP, Springer, Heidelberg
    • Künzle, V., Reichert, M.: Towards Object-aware Process Management Systems: Issues, Challenges, Benefits. In: Proc. BPMDS 2009. LNBIP, vol. 29, pp. 197-210. Springer, Heidelberg (2009)
    • (2009) Proc. BPMDS 2009 , vol.29 , pp. 197-210
    • Künzle, V.1    Reichert, M.2
  • 2
    • 84884311106 scopus 로고    scopus 로고
    • Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
    • Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. Inf. Syst. Secur. 3(2), 85-106 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 3
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 38149033667 scopus 로고    scopus 로고
    • A Formal Framework for Adaptive Access Control Models
    • Spaccapietra, S., Atzeni, P., Fages, F., Hacid, M.-S., Kifer, M., Mylopoulos, J., Pernici, B., Shvaiko, P., Trujillo, J., Zaihrayeu, I. (eds.) Journal on Data Semantics IX. Springer, Heidelberg
    • Rinderle-Ma, S., Manfred, R.: A Formal Framework for Adaptive Access Control Models. In: Spaccapietra, S., Atzeni, P., Fages, F., Hacid, M.-S., Kifer, M., Mylopoulos, J., Pernici, B., Shvaiko, P., Trujillo, J., Zaihrayeu, I. (eds.) Journal on Data Semantics IX. LNCS, vol. 4601, pp. 82-112. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4601 , pp. 82-112
    • Rinderle-Ma, S.1    Manfred, R.2
  • 8
    • 11144308857 scopus 로고    scopus 로고
    • Case handling: A new paradigm for business process support
    • DOI 10.1016/j.datak.2004.07.003, PII S0169023X04001296
    • Aalst, W., Weske, M., Grünbauer, D.: Case Handling: A new paradigm for business process support. Data and Knowledge Engineering 53(2), 129-162 (2005) (Pubitemid 40034560)
    • (2005) Data and Knowledge Engineering , vol.53 , Issue.2 , pp. 129-162
    • Van Der Aalst, W.M.P.1    Weske, M.2    Grunbauer, D.3
  • 10
    • 38349070244 scopus 로고    scopus 로고
    • Data-driven Modeling and Coordination of Large Process Structures
    • Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. Springer, Heidelberg
    • Müller, D., Reichert, M., Herbst, J.: Data-driven Modeling and Coordination of Large Process Structures. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part I. LNCS, vol. 4803, pp. 131-149. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4803 , pp. 131-149
    • Müller, D.1    Reichert, M.2    Herbst, J.3
  • 11
    • 84957029150 scopus 로고    scopus 로고
    • Workflow Modeling using Proclets
    • Scheuermann, P., Etzion, O. (eds.) CoopIS 2000. Springer, Heidelberg
    • Aalst,W., Barthelmess, P., Ellis, C.,Wainer, J.:Workflow Modeling using Proclets. In: Scheuermann, P., Etzion, O. (eds.) CoopIS 2000. LNCS, vol. 1901, pp. 198-209. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1901 , pp. 198-209
    • Aalst, W.1    Barthelmess, P.2    Ellis, C.3    Wainer, J.4
  • 13
    • 0032027672 scopus 로고    scopus 로고
    • Data security
    • Bertino, E.: Data security. Data Knowl. Eng. 25(1-2), 199-216 (1998)
    • (1998) Data Knowl. Eng. , vol.25 , Issue.1-2 , pp. 199-216
    • Bertino, E.1
  • 15
    • 84964853055 scopus 로고    scopus 로고
    • Access Control: Policies, Models and Mechanisms
    • Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. Springer, Heidelberg
    • Samarati, P., Vimercati, S.: Access Control: Policies, Models and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, p. 137. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2171 , pp. 137
    • Samarati, P.1    Vimercati, S.2
  • 17
    • 33646676768 scopus 로고    scopus 로고
    • Balancing Flexibility and Security in Adaptive Process Management Systems
    • Meersman, R., Tari, Z. (eds.) OTM 2005. Springer, Heidelberg
    • Weber, B., Reichert, M., Wild, W., Rinderle, S.: Balancing Flexibility and Security in Adaptive Process Management Systems. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol. 3760, pp. 59-76. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3760 , pp. 59-76
    • Weber, B.1    Reichert, M.2    Wild, W.3    Rinderle, S.4
  • 18
    • 77953963972 scopus 로고    scopus 로고
    • Modellierung der Aufbauorganisation in Workflow- Management-Systemen: Kritische Bestandsaufnahme und Gestaltungsvorschläge
    • Rosemann, M., Mühlen, M.: Modellierung der Aufbauorganisation in Workflow- Management-Systemen: Kritische Bestandsaufnahme und Gestaltungsvorschläge. EMISA Forum 3(1), 78-86 (1998)
    • (1998) EMISA Forum , vol.3 , Issue.1 , pp. 78-86
    • Rosemann, M.1    Mühlen, M.2
  • 19
    • 11144352941 scopus 로고    scopus 로고
    • Organizational Management in Workflow Applications: Issues and Perspectives
    • Rosemann, M., Mühlen, M.: Organizational Management in Workflow Applications: Issues and Perspectives. Inf. Technol. and Mgmt. 5(3-4), 271-291 (2004)
    • (2004) Inf. Technol. and Mgmt. , vol.5 , Issue.3-4 , pp. 271-291
    • Rosemann, M.1    Mühlen, M.2
  • 21
    • 84863273586 scopus 로고    scopus 로고
    • A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications
    • Hu, J., Weaver, A.: A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications. In: Proc. PSPT 2004 (2004)
    • Proc. PSPT 2004 (2004)
    • Hu, J.1    Weaver, A.2
  • 22
    • 15944413918 scopus 로고    scopus 로고
    • Context Sensitivity in Role-based Access Control
    • Kumar, A., Karnik, N., Chafle, G.: Context Sensitivity in Role-based Access Control. SIGOPS 36(3), 53-66 (2002)
    • (2002) SIGOPS , vol.36 , Issue.3 , pp. 53-66
    • Kumar, A.1    Karnik, N.2    Chafle, G.3
  • 23
    • 0347380552 scopus 로고    scopus 로고
    • Supporting Relationships in Access Control Using Role Based Access Control
    • Barkley, J., Beznosov, K., Uppal, J.: Supporting Relationships in Access Control Using Role Based Access Control. In: Proc. RBAC 1999, pp. 55-65 (1999)
    • (1999) Proc. RBAC 1999 , pp. 55-65
    • Barkley, J.1    Beznosov, K.2    Uppal, J.3
  • 24
    • 37649012775 scopus 로고    scopus 로고
    • Modeling Business Contexture and Behavior Using Business Artifacts
    • Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. Springer, Heidelberg
    • Liu, R., Bhattacharya, K., Wu, F.: Modeling Business Contexture and Behavior Using Business Artifacts. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. LNCS, vol. 4495, pp. 324-339. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4495 , pp. 324-339
    • Liu, R.1    Bhattacharya, K.2    Wu, F.3
  • 25
    • 45849134543 scopus 로고    scopus 로고
    • Product-based Workow Support: Dynamic Workow Execution
    • Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. Springer, Heidelberg
    • Vanderfeesten, I.T.P., Reijers, H.A., van der Aalst, W.M.P.: Product-based Workow Support: Dynamic Workow Execution. In: Bellahsène, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 571-574. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5074 , pp. 571-574
    • Vanderfeesten, I.T.P.1    Reijers, H.A.2    Van Der Aalst, W.M.P.3
  • 26
    • 45849109580 scopus 로고    scopus 로고
    • A New Paradigm for the Enactment and Dynamic Adaptation of Data-driven Process Structures
    • Bellahsëne, Z., Léonard, M. (eds.) CAiSE 2008. Springer, Heidelberg
    • Müller, D., Reichert, M., Herbst, J.: A New Paradigm for the Enactment and Dynamic Adaptation of Data-driven Process Structures. In: Bellahsëne, Z., Léonard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 48-63. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5074 , pp. 48-63
    • Müller, D.1    Reichert, M.2    Herbst, J.3
  • 27
    • 0002841051 scopus 로고    scopus 로고
    • Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management
    • Sandhu, R., Thomas, R.: Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In: Proc. IFIP 1997, pp. 166-181 (1997)
    • (1997) Proc. IFIP 1997 , pp. 166-181
    • Sandhu, R.1    Thomas, R.2
  • 28
    • 0036161253 scopus 로고    scopus 로고
    • Authorization and access control of application data in workflow systems
    • DOI 10.1023/A:1012972608697
    • Wu, S., Sheth, A., Miller, J., Luo, Z.: Authorization and Access Control Of Application Data In Workflow-Systems. JIIS 18, 71-94 (2002) (Pubitemid 34129948)
    • (2002) Journal of Intelligent Information Systems , vol.18 , Issue.1 , pp. 71-94
    • Wu, S.1    Sheth, A.2    Miller, J.3    Luo, Z.4
  • 29
    • 0031373615 scopus 로고    scopus 로고
    • A Policy Based Role Object Model
    • Lupu, E., Sloman, M.: A Policy Based Role Object Model. In: Proc. EDOC 1997, pp. 36-47 (1997)
    • (1997) Proc. EDOC 1997 , pp. 36-47
    • Lupu, E.1    Sloman, M.2
  • 30
    • 0031387996 scopus 로고    scopus 로고
    • Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments
    • Thomas, R.: Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. In: Proc. RBAC 1997, pp. 13-19 (1997)
    • (1997) Proc. RBAC 1997 , pp. 13-19
    • Thomas, R.1
  • 31
    • 25144499038 scopus 로고    scopus 로고
    • Workflow Resource Patterns
    • Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. Springer, Heidelberg
    • Russell, N., Hofstede, A., Edmond, D.: Workflow Resource Patterns. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 216-232. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3520 , pp. 216-232
    • Russell, N.1    Hofstede, A.2    Edmond, D.3
  • 32
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints
    • Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints. IJCIS 12 (2003)
    • (2003) IJCIS , vol.12
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.