메뉴 건너뛰기




Volumn , Issue , 2011, Pages 334-341

Responsibility-driven design and development of process-aware security policies

Author keywords

Process Aware Information Systems; Security policy design; Security policy development

Indexed keywords

ACCESS RULES; AUTHORIZATION CONSTRAINTS; AUTOMATED SUPPORT; BUSINESS PROCESS; DESIGN AND DEVELOPMENT; DESIGN METHODOLOGY; HUMAN ACTOR; ORGANIZATIONAL STRUCTURES; PROCESS MODEL; PROCESS MODELING; PROCESS-AWARE INFORMATION SYSTEMS; SECURITY POLICY; SENSITIVE DATAS;

EID: 80455140371     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2011.56     Document Type: Conference Paper
Times cited : (2)

References (17)
  • 1
    • 25144499038 scopus 로고    scopus 로고
    • Workflow resource patterns: Identification, representation and tool support
    • Advanced Information Systems Engineering: 17th International Conference, CAiSE 2005. Proceedings
    • N. Russell, W. M. van der Aalst, A. H. ter Hofstede, and D. Edmond, "Workflow resource patterns: Identification, representation and tool support," in Proc. of CAISE. Springer, 2005, pp. 216-232. (Pubitemid 41336105)
    • (2005) Lecture Notes in Computer Science , vol.3520 , pp. 216-232
    • Russell, N.1    Van Der Aalst, W.M.P.2    Ter Hofstede, A.H.M.3    Edmond, D.4
  • 2
    • 0242625198 scopus 로고    scopus 로고
    • An approach to engineer and enforce context constraints in an RBAC environment
    • ACM
    • G. Neumann and M. Strembeck, "An approach to engineer and enforce context constraints in an RBAC environment," in Proc. of ACM SACMAT. ACM, 2003, pp. 65-79.
    • (2003) Proc. of ACM SACMAT , pp. 65-79
    • Neumann, G.1    Strembeck, M.2
  • 3
    • 9544223971 scopus 로고    scopus 로고
    • A secure workflow model
    • Australian Computer Society, Inc.
    • P. C. K. Hung and K. Karlapalem, "A secure workflow model," in Proc. of AISC on ACSW frontiers 2003 - Volume 21. Australian Computer Society, Inc., 2003, pp. 33-41.
    • (2003) Proc. of AISC on ACSW Frontiers 2003 , vol.21 , pp. 33-41
    • Hung, P.C.K.1    Karlapalem, K.2
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 65-104, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 6
    • 79952372864 scopus 로고    scopus 로고
    • On evolving organizational models without loosing control on authorization constraints in web service orchestrations
    • S. Rinderle-Ma and M. Leitner, "On evolving organizational models without loosing control on authorization constraints in web service orchestrations," in CEC, 2010.
    • (2010) CEC
    • Rinderle-Ma, S.1    Leitner, M.2
  • 7
    • 0032218219 scopus 로고    scopus 로고
    • Event-based detection of concurrency
    • ACM
    • J. E. Cook and A. L. Wolf, "Event-based detection of concurrency," in Proc. of ACM SIGSOFT FSE. ACM, 1998, p. 35-45.
    • (1998) Proc. of ACM SIGSOFT FSE , pp. 35-45
    • Cook, J.E.1    Wolf, A.L.2
  • 10
    • 0242709332 scopus 로고    scopus 로고
    • A scenario-driven role engineering process for functional RBAC roles
    • ACM
    • G. Neumann and M. Strembeck, "A scenario-driven role engineering process for functional RBAC roles," in Proc. Of ACM SACMAT. ACM, 2002, p. 33-42.
    • (2002) Proc. of ACM SACMAT , pp. 33-42
    • Neumann, G.1    Strembeck, M.2
  • 11
    • 0242625194 scopus 로고    scopus 로고
    • Role mining- revealing business roles for security administration using data mining technology
    • ACM
    • M. Kuhlmann, D. Shohat, and G. Schimpf, "Role mining- revealing business roles for security administration using data mining technology," in Proceedings of the eighth ACM SACMAT. ACM, 2003, p. 179-186.
    • (2003) Proceedings of the Eighth ACM SACMAT , pp. 179-186
    • Kuhlmann, M.1    Shohat, D.2    Schimpf, G.3
  • 14
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC - A workflow security model incorporating controlled overriding of constraints
    • DOI 10.1142/S0218843003000814
    • J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC - a workflow security model incorporating controlled overriding of constraints," International Journal of Cooperative Information Systems, vol. 12, no. 4, pp. 455-485, 2003. (Pubitemid 38000660)
    • (2003) International Journal of Cooperative Information Systems , vol.12 , Issue.4 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3
  • 15
    • 0001549660 scopus 로고    scopus 로고
    • The ARBAC97 model for role-based administration of roles
    • R. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 105-135, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 105-135
    • Sandhu, R.1    Bhamidipati, V.2    Munawer, Q.3
  • 16
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • F. Casati, S. Castano, and M. Fugini, "Managing workflow authorization constraints through active database technology," Inf. Syst. Frontiers, vol. 3, no. 3, pp. 319-338, 2001.
    • (2001) Inf. Syst. Frontiers , vol.3 , Issue.3 , pp. 319-338
    • Casati, F.1    Castano, S.2    Fugini, M.3
  • 17
    • 85117415611 scopus 로고    scopus 로고
    • Verifying workflow processes against organization security policies
    • IEEE Computer Society
    • C. Ribeiro and P. Guedes, "Verifying workflow processes against organization security policies," in Proc. of WETICE. IEEE Computer Society, 1999, pp. 190-191.
    • (1999) Proc. of WETICE , pp. 190-191
    • Ribeiro, C.1    Guedes, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.