-
1
-
-
0010011180
-
INCAs: Managing Dynamic Workflows in Distributed Environments
-
D. Barbara, S. Mehrotra, and M. Rusinkiewicz, “INCAs: Managing Dynamic Workflows in Distributed Environments,” J. Database Management, vol. 7, no. 1, 1996
-
(1996)
J. Database Management
, vol.7
, Issue.1
-
-
Barbara, D.1
Mehrotra, S.2
Rusinkiewicz, M.3
-
3
-
-
0035750945
-
A Chinese Wall Security Model for Decentralized Workflow Systems
-
V. Atluri, S.A. Chun, and P. Mazzoleni, “A Chinese Wall Security Model for Decentralized Workflow Systems,” Proc. Eighth ACM Conf. Computer and Comm. Security (CCS '01), pp. 48–57, 2001
-
(2001)
Proc. Eighth ACM Conf. Computer and Comm. Security (CCS '01)
, pp. 48-57
-
-
Atluri, V.1
Chun, S.A.2
Mazzoleni, P.3
-
4
-
-
9544241320
-
Preventing Information Leakage within Workflows that Execute among Competing Organizations
-
S. Chou, A. Liu, and C. Wu, “Preventing Information Leakage within Workflows that Execute among Competing Organizations,” J. Systems Software, vol. 75, nos. 1–2, pp. 109–123, 2005
-
(2005)
J. Systems Software
, vol.75
, Issue.1-2
, pp. 109-123
-
-
Chou, S.1
Liu, A.2
Wu, C.3
-
5
-
-
0035790711
-
Access Control Mechanisms for Inter-Organizational Workflow
-
M.H. Kang, J.S. Park, and J.N. Froscher, “Access Control Mechanisms for Inter-Organizational Workflow,” Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01), pp. 66–74, 2001
-
(2001)
Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01)
, pp. 66-74
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
6
-
-
0030676973
-
Anonymous Connections and Onion Routing
-
P.F. Syverson, D.M. Goldschlag, and M.G. Reed, “Anonymous Connections and Onion Routing,” Proc. IEEE Symp. Security and Privacy, pp. 44–54, 1997
-
(1997)
Proc. IEEE Symp. Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
8
-
-
35248838897
-
Enforcing Integrity of Execution in Distributed Workflow Management Systems
-
(SCC '07), July
-
F. Montagut and R. Molva, “Enforcing Integrity of Execution in Distributed Workflow Management Systems,” Proc. Int'l Conf. Services Computing (SCC '07), July 2007
-
(2007)
Proc. Int'l Conf. Services Computing
-
-
Montagut, F.1
Molva, R.2
-
13
-
-
84921018856
-
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, “A Practical and Provably Secure Coalition-Resistant Group Signature Scheme,” Lecture Notes in Computer Science, vol. 1880, pp. 255–271, 2000
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 255-271
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
15
-
-
0037194815
-
ID-Based Signatures from Pairings on Elliptic Curves
-
K. Paterson, “ID-Based Signatures from Pairings on Elliptic Curves,” Electronics Letters, vol. 38, no. 18, pp. 1025–1026, 2002
-
(2002)
Electronics Letters
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.1
-
16
-
-
70249102028
-
An Identity Based Encryption System
-
L. Owens, A. Duffy, and T. Dowling, “An Identity Based Encryption System,” Proc. Third Int'l Symp. Principles and Practice of Programming in Java (PPPJ '04), pp. 154–159, 2004
-
(2004)
Proc. Third Int'l Symp. Principles and Practice of Programming in Java (PPPJ '04)
, pp. 154-159
-
-
Owens, L.1
Duffy, A.2
Dowling, T.3
-
17
-
-
78651431091
-
Bouncy Castle
-
Bouncy Castle, http://www.bouncycastle.org, 2007
-
(2007)
-
-
-
18
-
-
77956387193
-
Business Process Execution Language for Web Sevices
-
Business Process Execution Language for Web Sevices, http://www.ibm.com/developerworks/library/ws-bpel, 2008
-
(2008)
-
-
-
20
-
-
0002848811
-
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
E. Bertino, E. Ferrari, and V. Atluri, “The Specification and Enforcement of Authorization Constraints in Workflow Management Systems,” ACM Trans. Information and System Security, vol. 2, no. 1, pp. 65–104 1999
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
23
-
-
12344279972
-
From Conflict of Interest to Separation of Duties in WS-Policy for Web Services Matchmaking Process
-
p. 30066.2
-
P.C.K. Hung, “From Conflict of Interest to Separation of Duties in WS-Policy for Web Services Matchmaking Process,” Proc. 37th Ann. Hawaii Int'l Conf. System Sciences—Track 3 (HICSS '04), p. 30066.2, vol. 3, 2004
-
(2004)
Proc. 37th Ann. Hawaii Int'l Conf. System Sciences—Track 3 (HICSS '04)
, vol.3
-
-
Hung, P.C.K.1
-
24
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, “Role-Based Access Control Models,” Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
26
-
-
0033650839
-
Injecting RBAC to Secure a Web-Based Workflow System
-
G.-J. Ahn, R. Sandhu, M.H. Kang, and J.S. Park, “Injecting RBAC to Secure a Web-Based Workflow System,” Proc. Fifth ACM Workshop on Role-Based Access Control, pp. 1–10, 2000
-
(2000)
Proc. Fifth ACM Workshop on Role-Based Access Control
, pp. 1-10
-
-
Ahn, G.-J.1
Sandhu, R.2
Kang, M.H.3
Park, J.S.4
-
27
-
-
33845505698
-
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems
-
W.T. Tsai, X. Liu, and Y. Chen, “Distributed Policy Specification and Enforcement in Service-Oriented Business Systems,” Proc. IEEE Int'l Conf. e-Business Eng. (ICEBE '05), pp. 10–17, 2005
-
(2005)
Proc. IEEE Int'l Conf. e-Business Eng. (ICEBE '05)
, pp. 10-17
-
-
Tsai, W.T.1
Liu, X.2
Chen, Y.3
-
30
-
-
38949086163
-
Access Control and Authorization Constraints for WS-BPEL
-
E. Bertino, J. Crampton, and F. Paci, “Access Control and Authorization Constraints for WS-BPEL,” Proc. IEEE Int'l Conf. Web Services (ICWS '06), pp. 275–284, 2006
-
(2006)
Proc. IEEE Int'l Conf. Web Services (ICWS '06)
, pp. 275-284
-
-
Bertino, E.1
Crampton, J.2
Paci, F.3
-
31
-
-
51249107480
-
OASIS eXtensible Access Control Markup Language (XACML)
-
“OASIS eXtensible Access Control Markup Language (XACML),” 2005
-
(2005)
-
-
-
34
-
-
0242696170
-
ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks
-
J. Kong and X. Hong, “ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks,” Proc. MobiHoc '03, pp. 291–302, 2003
-
(2003)
Proc. MobiHoc '03
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
35
-
-
15344338536
-
Anonymous Communications for Mobile Agents
-
L. Korba, R. Song, and G. Yee, “Anonymous Communications for Mobile Agents,” Proc. Fourth Int'l Workshop Mobile Agents for Telecomm. Applications (MATA '02), pp. 171–181, 2002
-
(2002)
Proc. Fourth Int'l Workshop Mobile Agents for Telecomm. Applications (MATA '02)
, pp. 171-181
-
-
Korba, L.1
Song, R.2
Yee, G.3
-
36
-
-
38749136504
-
WS-AtomicTransaction
-
D. Langworthy et al., “WS-AtomicTransaction,” http://download.boulder.ibm.com/ibmdl/pub/software/dw/specs/ws-tx/WS-AtomicTransaction.pdf, 2005
-
(2005)
-
-
Langworthy, D.1
-
37
-
-
38749103380
-
WS-BusinessActivity
-
http://download.boulder.ibm.com/ibmdl/pub/software/dw/library/ws-busact200411.pdf
-
L.F. Cabrera et al., “WS-BusinessActivity,” http://download.boulder.ibm.com/ibmdl/pub/software/dw/library/ws-busact200411.pdf, 2005
-
(2005)
-
-
Cabrera, L.F.1
-
38
-
-
1642298252
-
-
Springer Verlag
-
G. Alonso, F. Casati, H. Kuno, and V. Machiraju, Web Services: Concepts, Architectures, and Applications. Springer Verlag, 2003
-
(2003)
Web Services: Concepts, Architectures, and Applications
-
-
Alonso, G.1
Casati, F.2
Kuno, H.3
Machiraju, V.4
-
39
-
-
0347622255
-
Web Services and Business Transactions
-
M.P. Papazoglou, “Web Services and Business Transactions,” World Wide Web, vol. 6, no. 1, pp. 49–91, 2003
-
(2003)
World Wide Web
, vol.6
, Issue.1
, pp. 49-91
-
-
Papazoglou, M.P.1
-
40
-
-
30944449466
-
Achieving Survivability in Business Process Execution Language for Web Services (BPEL) with Exception-Flows
-
C.K. Fung, P.C.K. Hung, and D.H. Folger, “Achieving Survivability in Business Process Execution Language for Web Services (BPEL) with Exception-Flows,” Proc. IEEE Int'l Conf. e-Technology, e-Commerce, and e-Service (EEE '05), pp. 68–74, 2005
-
(2005)
Proc. IEEE Int'l Conf. e-Technology, e-Commerce, and e-Service (EEE '05)
, pp. 68-74
-
-
Fung, C.K.1
Hung, P.C.K.2
Folger, D.H.3
-
41
-
-
33744948575
-
Handling Faults in Decentralized Orchestration of Composite Web Services
-
G. Chafle, S. Chandra, P. Kankar, and V. Mann, “Handling Faults in Decentralized Orchestration of Composite Web Services,” Lecture Notes in Computer Science, vol. 3826, 2005
-
(2005)
Lecture Notes in Computer Science
, vol.3826
-
-
Chafle, G.1
Chandra, S.2
Kankar, P.3
Mann, V.4
|