메뉴 건너뛰기




Volumn , Issue , 2008, Pages 213-230

Security for workflow systems

Author keywords

[No Author keywords available]

Indexed keywords


EID: 80054978864     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-48533-1_9     Document Type: Chapter
Times cited : (27)

References (28)
  • 1
    • 0003945931 scopus 로고
    • Technical report, Workflow Management Coalition
    • Workflow reference model. Technical report, Workflow Management Coalition, 1994.
    • (1994) Workflow Reference Model
  • 6
    • 0033685030 scopus 로고    scopus 로고
    • A petri net based safety analysis of workflow authorization models
    • Vijayalakshmi Atluri andWei-Kuang Huang. A Petri Net Based Safety Analysis of Workflow Authorization Models. Journal of Computer Security, 8(2/3):209-240, 2000.
    • (2000) Journal of Computer Security , vol.8 , Issue.2-3 , pp. 209-240
    • Atluri, V.1    Huang, W.-K.2
  • 7
    • 30644477677 scopus 로고    scopus 로고
    • Supporting conditional delegation in secure workflow management systems
    • Vijayalakshmi Atluri and Janice Warner. Supporting conditional delegation in secure workflow management systems. In SACMAT, 2005.
    • (2005) SACMAT
    • Atluri, V.1    Warner, J.2
  • 9
    • 0031382313 scopus 로고    scopus 로고
    • A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems
    • November
    • Elisa Bertino, Elena Ferrari, and Vijayalakshmi Atluri. A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems. In Proc. of the 2nd ACM Workshop on Rolebased Access Control, November 1997.
    • (1997) Proc. of the 2nd ACM Workshop on Rolebased Access Control
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 10
    • 0002848811 scopus 로고    scopus 로고
    • An approach for the specification and enforcement of authorization constraints in workflow management systems
    • February
    • Elisa Bertino, Elena Ferrari, and Vijayalakshmi Atluri. An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information Systems Security, 2(1), February 1999.
    • (1999) ACM Transactions on Information Systems Security , vol.2 , Issue.1
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 11
    • 0002848811 scopus 로고    scopus 로고
    • An approach for the specification and enforcement of authorization constraints in workflow management systems
    • February
    • Elisa Bertino, Elena Ferrari, and Vijayalakshmi Atluri. An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information Systems Security, 2(1), February 1999.
    • (1999) ACM Transactions on Information Systems Security , vol.2 , Issue.1
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 12
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • R. Botha and J. Eloff. Separation of duties for access control enforcement in workflow environments. IBM Systems Journal, 40(3), 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3
    • Botha, R.1    Eloff, J.2
  • 14
    • 30644475116 scopus 로고    scopus 로고
    • A reference monitor for workflow systems with constrained task execution
    • J. Crampton. A reference monitor for workflow systems with constrained task execution. In SACMAT 05, 2005.
    • (2005) SACMAT 05
    • Crampton, J.1
  • 15
    • 33747074188 scopus 로고
    • An overview of workflow management: From process modeling to workflow automation infrastructure
    • Dimitrios Georgakopoulos, Mark F. Hornick, and Amit P. Sheth. An overview of workflow management: From process modeling to workflow automation infrastructure. Distributed and Parallel Databases, 3(2):119-153, 1995.
    • (1995) Distributed and Parallel Databases , vol.3 , Issue.2 , pp. 119-153
    • Georgakopoulos, D.1    Hornick, M.F.2    Sheth, A.P.3
  • 20
    • 0035790711 scopus 로고    scopus 로고
    • Access control mechanisms for inter-organizational workflows
    • Myong H. Kang, Joon S. Park, and Judith N. Froscher. Access control mechanisms for inter-organizational workflows. In SACMAT, 2001.
    • (2001) SACMAT
    • Kang, M.H.1    Park, J.S.2    Froscher, J.N.3
  • 28
    • 33748053971 scopus 로고    scopus 로고
    • Inter-instance authorization constraints for secure workflow management
    • Janice Warner and Vijayalakshmi Atluri. Inter-instance authorization constraints for secure workflow management. In SACMAT, 2006.
    • (2006) SACMAT
    • Vijayalakshmi, W.1    Atluri, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.