-
1
-
-
25144499038
-
Workflow resource patterns: Identification, representation and tool support
-
Advanced Information Systems Engineering: 17th International Conference, CAiSE 2005. Proceedings
-
N. Russell, W. M. van der Aalst, A. H. ter Hofstede, and D. Edmond, "Workflow resource patterns: Identification, representation and tool support," in Proc. of CAISE. Springer, 2005, pp. 216-232. (Pubitemid 41336105)
-
(2005)
Lecture Notes in Computer Science
, vol.3520
, pp. 216-232
-
-
Russell, N.1
Van Der Aalst, W.M.P.2
Ter Hofstede, A.H.M.3
Edmond, D.4
-
2
-
-
0242625198
-
An approach to engineer and enforce context constraints in an RBAC environment
-
ACM
-
G. Neumann and M. Strembeck, "An approach to engineer and enforce context constraints in an RBAC environment," in Proc. of ACM SACMAT. ACM, 2003, pp. 65-79.
-
(2003)
Proc. of ACM SACMAT
, pp. 65-79
-
-
Neumann, G.1
Strembeck, M.2
-
3
-
-
9544223971
-
A secure workflow model
-
Australian Computer Society, Inc.
-
P. C. K. Hung and K. Karlapalem, "A secure workflow model," in Proc. of AISC on ACSW frontiers 2003 - Volume 21. Australian Computer Society, Inc., 2003, pp. 33-41.
-
(2003)
Proc. of AISC on ACSW Frontiers 2003
, vol.21
, pp. 33-41
-
-
Hung, P.C.K.1
Karlapalem, K.2
-
4
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 65-104, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
6
-
-
79952372864
-
On evolving organizational models without loosing control on authorization constraints in web service orchestrations
-
S. Rinderle-Ma and M. Leitner, "On evolving organizational models without loosing control on authorization constraints in web service orchestrations," in CEC, 2010.
-
(2010)
CEC
-
-
Rinderle-Ma, S.1
Leitner, M.2
-
7
-
-
0032218219
-
Event-based detection of concurrency
-
ACM
-
J. E. Cook and A. L. Wolf, "Event-based detection of concurrency," in Proc. of ACM SIGSOFT FSE. ACM, 1998, p. 35-45.
-
(1998)
Proc. of ACM SIGSOFT FSE
, pp. 35-45
-
-
Cook, J.E.1
Wolf, A.L.2
-
8
-
-
34147190948
-
Business process mining: An industrial application
-
DOI 10.1016/j.is.2006.05.003, PII S0306437906000305
-
W. van der Aalst, H. Reijers, A. Weijters, B. van Dongen, A. A. de Medeiros, M. Song, and H. Verbeek, "Business process mining: An industrial application," Information Systems, vol. 32, no. 5, pp. 713-732, Jul. 2007. (Pubitemid 46560274)
-
(2007)
Information Systems
, vol.32
, Issue.5
, pp. 713-732
-
-
Van Der Aalst, W.M.P.1
Reijers, H.A.2
Weijters, A.J.M.M.3
Van Dongen, B.F.4
Alves De Medeiros, A.K.5
Song, M.6
Verbeek, H.M.W.7
-
10
-
-
0242709332
-
A scenario-driven role engineering process for functional RBAC roles
-
ACM
-
G. Neumann and M. Strembeck, "A scenario-driven role engineering process for functional RBAC roles," in Proc. Of ACM SACMAT. ACM, 2002, p. 33-42.
-
(2002)
Proc. of ACM SACMAT
, pp. 33-42
-
-
Neumann, G.1
Strembeck, M.2
-
11
-
-
0242625194
-
Role mining- revealing business roles for security administration using data mining technology
-
ACM
-
M. Kuhlmann, D. Shohat, and G. Schimpf, "Role mining- revealing business roles for security administration using data mining technology," in Proceedings of the eighth ACM SACMAT. ACM, 2003, p. 179-186.
-
(2003)
Proceedings of the Eighth ACM SACMAT
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
12
-
-
33749635457
-
A declarative approach for flexible business processes management
-
Business Process Management Workshops, BPM 2006 - International Workshops, BPD, BPI, ENEI, GPWW, DPM, semantics4ws, Proceedings
-
M. Pesic and W. van der Aalst, "A declarative approach for flexible business processes management," in Business Process Management Workshops. Springer, 2006, vol. 4103, pp. 169-180. (Pubitemid 44543247)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4103
, pp. 169-180
-
-
Pesic, M.1
Van Der Aalst, W.M.P.2
-
13
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
R. Sandhu, D. Ferraiolo, and R. Kuhn, "The NIST model for role-based access control: towards a unified standard," in Proceedings of the fifth ACM workshop on Role-based access control, 2000, pp. 47-63.
-
(2000)
Proceedings of the Fifth ACM Workshop on Role-based Access Control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
14
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
DOI 10.1142/S0218843003000814
-
J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC - a workflow security model incorporating controlled overriding of constraints," International Journal of Cooperative Information Systems, vol. 12, no. 4, pp. 455-485, 2003. (Pubitemid 38000660)
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
15
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
R. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 105-135, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
16
-
-
0035594917
-
Managing workflow authorization constraints through active database technology
-
F. Casati, S. Castano, and M. Fugini, "Managing workflow authorization constraints through active database technology," Inf. Syst. Frontiers, vol. 3, no. 3, pp. 319-338, 2001.
-
(2001)
Inf. Syst. Frontiers
, vol.3
, Issue.3
, pp. 319-338
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
17
-
-
85117415611
-
Verifying workflow processes against organization security policies
-
IEEE Computer Society
-
C. Ribeiro and P. Guedes, "Verifying workflow processes against organization security policies," in Proc. of WETICE. IEEE Computer Society, 1999, pp. 190-191.
-
(1999)
Proc. of WETICE
, pp. 190-191
-
-
Ribeiro, C.1
Guedes, P.2
|