-
2
-
-
0002848811
-
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
February
-
Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security (TISSEC) 2(1) (February 1999)
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
3
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
Botha, R., Eloff, J.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3) (2001)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
-
-
Botha, R.1
Eloff, J.2
-
4
-
-
0035594917
-
Managing Workflow Authorization Constraints through Active Database Technology
-
September
-
Casati, F., Castano, S., Fugini, M.: Managing Workflow Authorization Constraints through Active Database Technology. Information Systems Frontiers 3(3) (September 2001)
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
5
-
-
0002422823
-
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet
-
February
-
Ferraiolo, D., Barkley, J., Kuhn, D.: A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information and System Security (TISSEC) 2(1) (February 1999)
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.1
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, D.3
-
6
-
-
84870642884
-
Role-Based Access Control for Information Federations in the Industrial Service Sector
-
June
-
Kunz, S., Evdokimov, S., Fabian, B., Stieger, B., Strembeck, M.: Role-Based Access Control for Information Federations in the Industrial Service Sector. In: Proc. of the 18th European Conference on Information Systems (ECIS) (June 2010)
-
(2010)
Proc. of the 18th European Conference on Information Systems (ECIS)
-
-
Kunz, S.1
Evdokimov, S.2
Fabian, B.3
Stieger, B.4
Strembeck, M.5
-
7
-
-
34249745790
-
On Mutually Exclusive Roles and Separation-of-Duty
-
May
-
Li, N., Tripunitara, M., Bizri, Z.: On Mutually Exclusive Roles and Separation-of-Duty. ACM Transactions on Information and System Security (TISSEC) 10(2) (May 2007)
-
(2007)
ACM Transactions on Information and System Security (TISSEC)
, vol.10
, Issue.2
-
-
Li, N.1
Tripunitara, M.2
Bizri, Z.3
-
8
-
-
49449083108
-
Beyond separation of duty: An algebra for specifying high-level security policies
-
July
-
Li, N., Wang, Q.: Beyond separation of duty: An algebra for specifying high-level security policies. Journal of the ACM (JACM) 55(3) (July 2008)
-
(2008)
Journal of the ACM (JACM)
, vol.55
, Issue.3
-
-
Li, N.1
Wang, Q.2
-
9
-
-
70350051021
-
Specifying Separation of Duty Constraints in BPEL4 People Processes
-
Proc. of the 11th International Conference on Business Information Systems (BIS). Springer, Heidelberg
-
Mendling, J., Ploesser, K., Strembeck, M.: Specifying Separation of Duty Constraints in BPEL4 People Processes. In: Proc. of the 11th International Conference on Business Information Systems (BIS). LNBIP, vol. 7, Springer, Heidelberg (2008)
-
(2008)
LNBIP
, vol.7
-
-
Mendling, J.1
Ploesser, K.2
Strembeck, M.3
-
11
-
-
25144499038
-
Workflow Resource Patterns: Identification, Representation and Tool Support
-
Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. Springer, Heidelberg
-
Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, Ó., Falcão e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 216-232. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3520
, pp. 216-232
-
-
Russell, N.1
Van Der Aalst, W.M.P.2
Ter Hofstede, A.H.M.3
Edmond, D.4
-
12
-
-
0030086382
-
Role-Based Access Control Models
-
February
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer 29(2) (February 1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
13
-
-
4444270398
-
Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences
-
February
-
Strembeck, M.: Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences. In: Proc. of the Conference on Software Engineering, SE 2004 (February 2004)
-
(2004)
Proc. of the Conference on Software Engineering, SE 2004
-
-
Strembeck, M.1
-
15
-
-
77249095368
-
Scenario-Driven Role Engineering
-
January/February
-
Strembeck, M.: Scenario-Driven Role Engineering. IEEE Security & Privacy 8(1) (January/February 2010)
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.1
-
-
Strembeck, M.1
-
18
-
-
0348209180
-
W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints
-
December
-
Wainer, J., Barthelmes, P., Kumar, A.: W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems (IJCIS) 12(4) (December 2003)
-
(2003)
International Journal of Cooperative Information Systems (IJCIS)
, vol.12
, Issue.4
-
-
Wainer, J.1
Barthelmes, P.2
Kumar, A.3
|