메뉴 건너뛰기




Volumn 15, Issue 4, 2010, Pages 359-373

An approach to capture authorisation requirements in business processes

Author keywords

Access control; Authorisation requirement; Business process management; Process modelling; Verification

Indexed keywords

AUTHORISATION REQUIREMENT; BUSINESS ANALYSTS; BUSINESS PROCESS; BUSINESS PROCESS MANAGEMENT; BUSINESS PROCESS MODELLING; FORMAL SEMANTICS; MODEL-CHECKING TECHNIQUES; MULTI-LEVEL; NEW MODEL; NON-FUNCTIONAL; PROCESS MODEL; PROCESS MODELLING; PROTOTYPE IMPLEMENTATIONS; ROLE-BASED; SECURITY EXPERTS; SEPARATION OF DUTY;

EID: 79451469078     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-010-0103-y     Document Type: Article
Times cited : (25)

References (43)
  • 6
    • 0030084693 scopus 로고    scopus 로고
    • Process mapping: One of three, new, special quality tools for management, quality and all other professionals
    • Anjard RP (1996) Process mapping: one of three, new, special quality tools for management, quality and all other professionals. Microelectron Reliab 36(2):223-225
    • (1996) Microelectron Reliab , vol.36 , Issue.2 , pp. 223-225
    • Anjard, R.P.1
  • 7
    • 84948980573 scopus 로고    scopus 로고
    • Uml activity diagrams as a workflow specification language
    • Dumas M, Arthur HM (2001) Uml activity diagrams as a workflow specification language. Lect Notes Comput Sci 2185:76-90
    • (2001) Lect Notes Comput Sci , vol.2185 , pp. 76-90
    • Dumas, M.1    Arthur, H.M.2
  • 12
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Clark DD, Wilson DR (1987) A comparison of commercial and military computer security policies. Secur Priv 00:184
    • (1987) Secur Priv , vol.0 , pp. 184
    • Clark, D.D.1    Wilson, D.R.2
  • 14
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • Sejong OH, Park S (2003) Task-role-based access control model. Inf Syst 28(6):533-562
    • (2003) Inf Syst , vol.28 , Issue.6 , pp. 533-562
    • Sejong, O.H.1    Park, S.2
  • 15
  • 16
    • 70350687578 scopus 로고    scopus 로고
    • Modeling in confidentiality and integrity for a supply chain network
    • Chen KL, Shing M-L, Lee H, Shing C-C (2007) Modeling in confidentiality and integrity for a supply chain network. Commun IIMA 7(1):41-48
    • (2007) Commun IIMA , vol.7 , Issue.1 , pp. 41-48
    • Chen, K.L.1    Shing, M.-L.2    Lee, H.3    Shing, C.-C.4
  • 19
    • 34548118380 scopus 로고    scopus 로고
    • Integration of multilevel security features into loosely coupled inter-organizational workflows
    • IEEE Computer Society, Washington, DC
    • Gami N, Mikolajczak B (2007) Integration of multilevel security features into loosely coupled inter-organizational workflows. In: ITNG '07: proceedings of the international conference on information technology. IEEE Computer Society, Washington, DC, pp 653-657
    • (2007) ITNG '07: Proceedings of the International Conference On Information Technology , pp. 653-657
    • Gami, N.1    Mikolajczak, B.2
  • 22
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • Botha RA, Eloff JHP (2001) Separation of duties for access control enforcement in workflow environments. IBM Syst J 40(3):666-682
    • (2001) IBM Syst J , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.A.1    Eloff, J.H.P.2
  • 29
    • 0003697514 scopus 로고
    • Center for the Study of Language and Information, Stanford
    • Goldblatt Robert (1987) Logics of time and computation. Center for the Study of Language and Information, Stanford
    • (1987) Logics of Time and Computation
    • Robert, G.1
  • 32
    • 0026883734 scopus 로고
    • Representing and using nonfunctional requirements: A process-oriented approach
    • Mylopoulos J, Chung L, Nixon B (1992) Representing and using nonfunctional requirements: a process-oriented approach. IEEE Trans Softw Eng 18(6):483-497
    • (1992) IEEE Trans Softw Eng , vol.18 , Issue.6 , pp. 483-497
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.3
  • 34
    • 40549104648 scopus 로고    scopus 로고
    • An ontology framework for semantic business process management
    • Hepp M, Roman D (2007) An ontology framework for semantic business process management. In: Wirtschaftsinformatik (1). Pp 423-440
    • (2007) Wirtschaftsinformatik , Issue.1 , pp. 423-440
    • Hepp, M.1    Roman, D.2
  • 35
    • 29744447253 scopus 로고    scopus 로고
    • Business-driven application security: From modeling to managing secure applications
    • Nagaratnam N, Nadalin AJ, Hondo M, McIntosh M, Austel P (2005) Business-driven application security: from modeling to managing secure applications. IBM Syst J 44(4):847-868
    • (2005) IBM Syst J , vol.44 , Issue.4 , pp. 847-868
    • Nagaratnam, N.1    Nadalin, A.J.2    Hondo, M.3    McIntosh, M.4    Austel, P.5
  • 36
    • 34247151648 scopus 로고    scopus 로고
    • A bpmn extension for the modeling of security requirements in business processes
    • Rodrguez A, Fernández-Medina E, Piattini M (2007) A bpmn extension for the modeling of security requirements in business processes. IEICE Trans 90-D(4):745-752
    • (2007) IEICE Trans 90-D(4) , pp. 745-752
    • Rodrguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 39
    • 85029776668 scopus 로고    scopus 로고
    • An automated tool for analyzing petri nets using SPIN
    • Gannod GC, Gupta S (2001) An automated tool for analyzing petri nets using SPIN. ASE 0:404
    • (2001) ASE , vol.0 , pp. 404
    • Gannod, G.C.1    Gupta, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.