메뉴 건너뛰기




Volumn , Issue , 2011, Pages 27-34

AW-RBAC: Access control in adaptive workflow systems

Author keywords

Access control; Process aware information systems; RBAC

Indexed keywords

ADAPTIVE WORKFLOW; ADMINISTRATION COSTS; ADMINISTRATIVE CHANGES; APPLICATION COMPONENTS; CONTROL FLOWS; DATA FLOW; ORGANIZATIONAL STRUCTURES; PROCESS-AWARE INFORMATION SYSTEMS; PROOF OF CONCEPT; RBAC; RBAC MODEL; ROLE-BASED ACCESS CONTROL MODEL; SECURITY PROBLEMS; WORK-FLOW SYSTEMS;

EID: 80455140452     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2011.15     Document Type: Conference Paper
Times cited : (20)

References (17)
  • 4
    • 47849117407 scopus 로고    scopus 로고
    • Change patterns and change support features - Enhancing flexibility in processaware information systems
    • B. Weber, M. Reichert, and S. Rinderle-Ma, "Change patterns and change support features - enhancing flexibility in processaware information systems." Data and Knowledge Engineering, vol. 66, no. 3, pp. 438-466, 2008.
    • (2008) Data and Knowledge Engineering , vol.66 , Issue.3 , pp. 438-466
    • Weber, B.1    Reichert, M.2    Rinderle-Ma, S.3
  • 5
    • 0001549660 scopus 로고    scopus 로고
    • The ARBAC97 model for role-based administration of roles
    • R. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 105-135, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 105-135
    • Sandhu, R.1    Bhamidipati, V.2    Munawer, Q.3
  • 9
    • 25144499038 scopus 로고    scopus 로고
    • Workflow resource patterns: Identification, representation and tool support
    • Advanced Information Systems Engineering: 17th International Conference, CAiSE 2005. Proceedings
    • N. Russell, W. M. van der Aalst, A. H. ter Hofstede, and D. Edmond, "Workflow resource patterns: Identification, representation and tool support," in Proc. Int'l Conf. Advanced Information Systems Engineering, 2005, pp. 216-232. (Pubitemid 41336105)
    • (2005) Lecture Notes in Computer Science , vol.3520 , pp. 216-232
    • Russell, N.1    Van Der Aalst, W.M.P.2    Ter Hofstede, A.H.M.3    Edmond, D.4
  • 10
    • 70449688135 scopus 로고    scopus 로고
    • Comprehensive life cycle support for access rules in information systems: The CEOSIS project
    • S. Rinderle-Ma and M. Reichert, "Comprehensive life cycle support for access rules in information systems: The CEOSIS project," Enterprise Inf. Syst., vol. 3, no. 3, pp. 219-251, 2009.
    • (2009) Enterprise Inf. Syst. , vol.3 , Issue.3 , pp. 219-251
    • Rinderle-Ma, S.1    Reichert, M.2
  • 11
    • 0142250279 scopus 로고    scopus 로고
    • Authorization and Access Control in Adaptive Workflows
    • Computer Security - ESORICS 2003
    • D. Domingos, A. Rito-Silva, and P. Veiga, "Authorization and access control in adaptive workflows," in Computer Security - ESORICS 2003, 2003, pp. 23-38. (Pubitemid 37311861)
    • (2003) Lecture Notes in Computer Science , Issue.2808 , pp. 23-38
    • Domingos, D.1    Rito-Silva, A.2    Veiga, P.3
  • 14
    • 33745801960 scopus 로고    scopus 로고
    • Understanding and developing role-based administrative models
    • DOI 10.1145/1102120.1102143, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • J. Crampton, "Understanding and developing role-based administrative models," in Proc. of the 12th ACM Conference on Computer and communications security, 2005, pp. 158-167. (Pubitemid 44022000)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 158-167
    • Crampton, J.1
  • 15
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • S. Oh and S. Park, "Task-role-based access control model," Information Systems, vol. 28, no. 6, pp. 533-562, 2003.
    • (2003) Information Systems , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 16
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC - A workflow security model incorporating controlled overriding of constraints
    • DOI 10.1142/S0218843003000814
    • J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC - a workflow security model incorporating controlled overriding of constraints," International Journal of Cooperative Information Systems, vol. 12, no. 4, pp. 455-485, 2003. (Pubitemid 38000660)
    • (2003) International Journal of Cooperative Information Systems , vol.12 , Issue.4 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.