-
2
-
-
79951826621
-
D9.1: Pilots specifications and use case scenarios
-
B. Claerhout, S. Winfield, and T. Kirkham, "D9.1: Pilots Specifications and Use Case Scenarios," TAS3 Consortium, Tech. Rep., 2009.
-
(2009)
TAS3 Consortium, Tech. Rep.
-
-
Claerhout, B.1
Winfield, S.2
Kirkham, T.3
-
5
-
-
33845432307
-
Aspect-oriented workflow languages
-
A. Charfi and M. Mezini, "Aspect-Oriented Workflow Languages," in CoopIS 2006, 2006.
-
(2006)
CoopIS 2006
-
-
Charfi, A.1
Mezini, M.2
-
7
-
-
4944250730
-
The consistency of task-based authorization constraints in workflow systems
-
Los Alamitos, CA, USA: IEEE Computer Society
-
K. Tan, J. Crampton, and C. A. Gunter, "The Consistency of Task-Based Authorization Constraints in Workflow Systems," in CSFW '04: Proceedings of the 17th IEEE workshop on Computer Security Foundations. Los Alamitos, CA, USA: IEEE Computer Society, 2004, pp. 155-169.
-
(2004)
CSFW '04: Proceedings of the 17th IEEE Workshop on Computer Security Foundations
, pp. 155-169
-
-
Tan, K.1
Crampton, J.2
Gunter, C.A.3
-
9
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed NIST Standard for Role-based Access Control," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
0017930809
-
METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
17
-
-
62949114652
-
Supporting attribute-based access control in authentication and authorization infrastructures with ontologies
-
Februar [Online]. Available
-
T. Priebe, W. Dobmeier, C. Schläger, and N. Kamprath, "Supporting Attribute-based Access Control in Authentication and Authorization Infrastructures with Ontologies," Journal of software: JSW, vol. 2, no. 1, pp. 27-38, Februar 2007. [Online]. Available: http://epub.uni-regensburg.de/6423/
-
(2007)
Journal of Software: JSW
, vol.2
, Issue.1
, pp. 27-38
-
-
Priebe, T.1
Dobmeier, W.2
Schläger, C.3
Kamprath, N.4
-
19
-
-
0031682433
-
-
Los Alamitos, CA, USA: IEEE Computer Society
-
V. Gligor, S. L. Gavrila, and D. Ferraiolo, "On the Formal Definition of Separation-of-Duty Policies and their Composition." Los Alamitos, CA, USA: IEEE Computer Society, 1998, pp. 172-183.
-
(1998)
On the Formal Definition of Separation-of-duty Policies and their Composition
, pp. 172-183
-
-
Gligor, V.1
Gavrila, S.L.2
Ferraiolo, D.3
-
21
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 65-104, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
22
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
DOI 10.1142/S0218843003000814
-
J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints," Int. J. Cooperative Inf. Syst., vol. 12, no. 4, pp. 455-485, 2003. (Pubitemid 38000660)
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
23
-
-
33746354903
-
-
Active Endpoints, Adobe, BEA, IBM, Oracle, SAP AG June
-
Active Endpoints, Adobe, BEA, IBM, Oracle, SAP AG, "WS-BPEL Extension for People," June 2007.
-
(2007)
WS-BPEL Extension for People
-
-
-
25
-
-
25144499038
-
-
Springer Berlin / Heidelberg ch. Workflow Resource Patterns: Identification, Representation and Tool Support
-
N. Russell, W. M. van der Aalst, A. H. ter Hofstede, and D. Edmond, Advanced Information Systems Engineering. Springer Berlin / Heidelberg, 2005, ch. Workflow Resource Patterns: Identification, Representation and Tool Support, pp. 216-232.
-
(2005)
Advanced Information Systems Engineering
, pp. 216-232
-
-
Russell, N.1
Van Der Aalst, W.M.2
Ter Hofstede, A.H.3
Edmond, D.4
-
26
-
-
84949747356
-
An Authorization Model for Workflows
-
V. Atluri and W.-K. Huang, "An Authorization Model for Workflows," in ESORICS '96: Proceedings of the 4th European Symposium on Research in Computer Security. London, UK: Springer-Verlag, 1996, pp. 44-64. (Pubitemid 126128893)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
27
-
-
0033685030
-
A Petri Net based safety analysis of workflow authorization models
-
3
-
-, "A Petri Net Based Safety Analysis of Workflow Authorization Models," J. Comput. Secur., vol. 8, no. 2, 3, pp. 209-240, 2000.
-
(2000)
J. Comput. Secur.
, vol.8
, Issue.2
, pp. 209-240
-
-
Atluri, V.1
Huang, W.-K.2
-
28
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented autorization management
-
London, UK, UK: Chapman & Hall, Ltd.
-
R. K. Thomas and R. S. Sandhu, "Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management," in Proceedings of the IFIP TC11 WG11.3 11th International Conference on Database Securty XI: Status and Prospects. London, UK, UK: Chapman & Hall, Ltd., 1998, pp. 166-181.
-
(1998)
Proceedings of the IFIP TC11 WG11.3 11th International Conference on Database Securty XI: Status and Prospects
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
29
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
New York, NY, USA: ACM
-
R. K. Thomas, "Team-based Access Control (TMAC): a Primitive for Applying Role-based Access Controls in Collaborative Environments," in RBAC '97: Proceedings of the Second ACM Workshop on Role-based Access Control. New York, NY, USA: ACM, 1997, pp. 13-19.
-
(1997)
RBAC '97: Proceedings of the Second ACM Workshop on Role-based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
30
-
-
0035790754
-
Flexible team-based access control using contexts
-
New York, NY, USA: ACM
-
C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, "Flexible Team-based Access Control using Contexts," in SACMAT '01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2001, pp. 21-27.
-
(2001)
SACMAT '01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 21-27
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
31
-
-
78650118674
-
The OAuth 1.0 protocol
-
(Informational), Internet Engineering Task Force, Apr. [Online]. Available
-
E. Hammer-Lahav, "The OAuth 1.0 Protocol," RFC 5849 (Informational), Internet Engineering Task Force, Apr. 2010. [Online]. Available: http://www.ietf.org/rfc/rfc5849.txt
-
(2010)
RFC 5849
-
-
Hammer-Lahav, E.1
-
32
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
L. Zhang, G.-J. Ahn, and B.-T. Chu, "A Rule-based Framework for Role-based Delegation and Revocation," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 404-441, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.-T.3
-
34
-
-
30644480988
-
-
J. Wainer and A. Kumar, "A Fine-grained, Controllable, User-to-user Delegation Method in RBAC," pp. 59-66, 2005.
-
(2005)
A Fine-grained, Controllable, User-to-user Delegation Method in RBAC
, pp. 59-66
-
-
Wainer, J.1
Kumar, A.2
-
35
-
-
41949086982
-
The venn of identity: Options and issues in federated identity management
-
DOI 10.1109/MSP.2008.50, 4480459
-
E. Maler and D. Reed, "The Venn of Identity: Options and Issues in Federated Identity Management," IEEE Security and Privacy, vol. 6, pp. 16-23, 2008. (Pubitemid 351506252)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 16-23
-
-
Maler, E.1
Reed, D.2
-
43
-
-
0012736565
-
RBAC policies in XML for X.509 based privilege management
-
A. Ghonaimy, M. T. El-Hadidi, and H. K. Aslan, Eds. Kluwer
-
D. W. Chadwick and A. Otenko, "RBAC Policies in XML for X.509 Based Privilege Management," in SEC, ser. IFIP Conference Proceedings, A. Ghonaimy, M. T. El-Hadidi, and H. K. Aslan, Eds., vol. 214. Kluwer, 2002, pp. 39-54.
-
(2002)
SEC, Ser. IFIP Conference Proceedings
, vol.214
, pp. 39-54
-
-
Chadwick, D.W.1
Otenko, A.2
-
44
-
-
38949086163
-
Access control and authorization constraints for WS-BPEL
-
DOI 10.1109/ICWS.2006.21, 4032037, Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services
-
E. Bertino, J. Crampton, and F. Paci, "Access Control and Authorization Constraints for WS-BPEL," in ICWS '06: Proceedings of the IEEE International Conference on Web Services. Los Alamitos, CA, USA: IEEE Computer Society, 2006, pp. 275-284. (Pubitemid 351209863)
-
(2006)
Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services
, pp. 275-284
-
-
Bertino, E.1
Crampton, J.2
Paci, F.3
-
46
-
-
13544276885
-
Process mining and security: Detecting anomalous process executions and checking process conformance
-
DOI 10.1016/j.entcs.2004.10.013, PII S1571066105000228
-
W. van der Aalst and A. de Medeiros, "Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance," Electronic Notes in Theoretical Computer Science, vol. 121, pp. 3 - 21, 2005. (Pubitemid 40219700)
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.121
, Issue.SPEC. ISS.
, pp. 3-21
-
-
Van Der Aalst, W.M.P.1
De Medeiros, A.K.A.2
|