-
3
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security (TISSEC) 2(1) (1999)
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
Botha, R.A., Eloff, J.H.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40(3) (2001)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
-
-
Botha, R.A.1
Eloff, J.H.2
-
5
-
-
0035594917
-
Managing Workflow Authorization Constraints through Active Database Technology
-
Casati, F., Castano, S., Fugini, M.: Managing Workflow Authorization Constraints through Active Database Technology. Information Systems Frontiers 3(3) (2001)
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
6
-
-
0002422823
-
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet
-
February
-
Ferraiolo, D., Barkley, J., Kuhn, D.: A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information and System Security (TISSEC) 2(1) (February 1999)
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.1
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, D.3
-
8
-
-
4143132099
-
Resolving constraint conflicts
-
Jaeger, T., Sailer, R., Zhang, X.: Resolving constraint conflicts. In: Proc. of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT (2004)
-
Proc. of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT (2004)
-
-
Jaeger, T.1
Sailer, R.2
Zhang, X.3
-
11
-
-
0002045898
-
Role-based access control models
-
Feinstein, H., Sandhu, R., Coyne, E., Youman, C.: Role-based access control models. IEEE Computer 29(2) (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Feinstein, H.1
Sandhu, R.2
Coyne, E.3
Youman, C.4
-
14
-
-
78650098860
-
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
-
Meersman, R., Dillon, T.S., Herrero, P. (eds.) OTM 2010. Springer, Heidelberg
-
Strembeck, M., Mendling, J.: Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context. In: Meersman, R., Dillon, T.S., Herrero, P. (eds.) OTM 2010. LNCS, vol. 6426, pp. 204-221. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6426
, pp. 204-221
-
-
Strembeck, M.1
Mendling, J.2
-
15
-
-
79952439750
-
Modeling Process-related RBAC Models with Extended UML Activity Models
-
Strembeck, M., Mendling, J.: Modeling Process-related RBAC Models with Extended UML Activity Models. Information and Software Technology 53(5) (2011)
-
(2011)
Information and Software Technology
, vol.53
, Issue.5
-
-
Strembeck, M.1
Mendling, J.2
-
17
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - A workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems (IJCIS) 12(4) (2003)
-
(2003)
International Journal of Cooperative Information Systems (IJCIS)
, vol.12
, Issue.4
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
18
-
-
84885080383
-
Purpose-based access control policies and conflicting analysis
-
Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. Springer, Heidelberg
-
Wang, H., Sun, L., Varadharajan, V.: Purpose-based access control policies and conflicting analysis. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol. 330, pp. 217-228. Springer, Heidelberg (2010)
-
(2010)
IFIP AICT
, vol.330
, pp. 217-228
-
-
Wang, H.1
Sun, L.2
Varadharajan, V.3
|