-
4
-
-
47849117407
-
Change patterns and change support features - Enhancing flexibility in processaware information systems
-
B. Weber, M. Reichert, and S. Rinderle-Ma, "Change patterns and change support features - enhancing flexibility in processaware information systems." Data and Knowledge Engineering, vol. 66, no. 3, pp. 438-466, 2008.
-
(2008)
Data and Knowledge Engineering
, vol.66
, Issue.3
, pp. 438-466
-
-
Weber, B.1
Reichert, M.2
Rinderle-Ma, S.3
-
5
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
R. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 105-135, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
6
-
-
34748917648
-
Administration in role-based access control
-
DOI 10.1145/1229285.1229305, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
N. Li and Z. Mao, "Administration in role-based access control," in 2nd ACM symposium on Information, computer and communications security, 2007, pp. 127-138. (Pubitemid 47479234)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 127-138
-
-
Li, N.1
Mao, Z.2
-
7
-
-
33646676768
-
Balancing flexibility and security in adaptive process management systems
-
On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE - OTM Confederated International Conferences, CoopIS, DOA, and ODBASE 2005, Proceedings
-
B. Weber, M. Reichert, W. Wild, and S. Rinderle, "Balancing flexibility and security in adaptive process management systems," On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, pp. 59-76, 2005. (Pubitemid 43734297)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3760
, pp. 59-76
-
-
Weber, B.1
Reichert, M.2
Wild, W.3
Rinderle, S.4
-
9
-
-
25144499038
-
Workflow resource patterns: Identification, representation and tool support
-
Advanced Information Systems Engineering: 17th International Conference, CAiSE 2005. Proceedings
-
N. Russell, W. M. van der Aalst, A. H. ter Hofstede, and D. Edmond, "Workflow resource patterns: Identification, representation and tool support," in Proc. Int'l Conf. Advanced Information Systems Engineering, 2005, pp. 216-232. (Pubitemid 41336105)
-
(2005)
Lecture Notes in Computer Science
, vol.3520
, pp. 216-232
-
-
Russell, N.1
Van Der Aalst, W.M.P.2
Ter Hofstede, A.H.M.3
Edmond, D.4
-
10
-
-
70449688135
-
Comprehensive life cycle support for access rules in information systems: The CEOSIS project
-
S. Rinderle-Ma and M. Reichert, "Comprehensive life cycle support for access rules in information systems: The CEOSIS project," Enterprise Inf. Syst., vol. 3, no. 3, pp. 219-251, 2009.
-
(2009)
Enterprise Inf. Syst.
, vol.3
, Issue.3
, pp. 219-251
-
-
Rinderle-Ma, S.1
Reichert, M.2
-
11
-
-
0142250279
-
Authorization and Access Control in Adaptive Workflows
-
Computer Security - ESORICS 2003
-
D. Domingos, A. Rito-Silva, and P. Veiga, "Authorization and access control in adaptive workflows," in Computer Security - ESORICS 2003, 2003, pp. 23-38. (Pubitemid 37311861)
-
(2003)
Lecture Notes in Computer Science
, Issue.2808
, pp. 23-38
-
-
Domingos, D.1
Rito-Silva, A.2
Veiga, P.3
-
12
-
-
77950236499
-
Building a modular service oriented workflow engine
-
G. Stuermer, J. Mangler, and E. Schikuta, "Building a modular service oriented workflow engine," in Service-Oriented Computing and Applications (SOCA), 2009 IEEE International Conference on, 2010, p. 1-4.
-
(2010)
Service-Oriented Computing and Applications (SOCA), 2009ftxt IEEE International Conference on
, pp. 1-4
-
-
Stuermer, G.1
Mangler, J.2
Schikuta, E.3
-
13
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
R. Sandhu, D. Ferraiolo, and R. Kuhn, "The NIST model for role-based access control: towards a unified standard," in Proc. of the fifth ACM workshop on Role-based access control, 2000, pp. 47-63.
-
(2000)
Proc. of the Fifth ACM Workshop on Role-based Access Control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
14
-
-
33745801960
-
Understanding and developing role-based administrative models
-
DOI 10.1145/1102120.1102143, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
J. Crampton, "Understanding and developing role-based administrative models," in Proc. of the 12th ACM Conference on Computer and communications security, 2005, pp. 158-167. (Pubitemid 44022000)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 158-167
-
-
Crampton, J.1
-
15
-
-
0038825675
-
Task-role-based access control model
-
S. Oh and S. Park, "Task-role-based access control model," Information Systems, vol. 28, no. 6, pp. 533-562, 2003.
-
(2003)
Information Systems
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
16
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
DOI 10.1142/S0218843003000814
-
J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC - a workflow security model incorporating controlled overriding of constraints," International Journal of Cooperative Information Systems, vol. 12, no. 4, pp. 455-485, 2003. (Pubitemid 38000660)
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
17
-
-
27144534492
-
Model-based design and analysis of permission-based security
-
Proceedings - 10th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2005
-
J. Jürjens, M. Lehrhuber, and G. Wimmel, "Model-based design and analysis of permission-based security," in Engineering of Complex Computer Systems, 2005. ICECCS 2005. Proc. 10th IEEE Int'l Conf. on, 2005, pp. 224-233. (Pubitemid 41495749)
-
(2005)
Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS
, pp. 224-233
-
-
Jurjens, J.1
Lehrhuber, M.2
Wimmel, G.3
|