메뉴 건너뛰기




Volumn , Issue , 2004, Pages 18-25

Workflow access control from A business perspective

Author keywords

Business modelling; Workflow access control

Indexed keywords

COMPUTER SIMULATION; CONSTRAINT THEORY; DATA PROCESSING; IDENTIFICATION (CONTROL SYSTEMS); INFORMATION MANAGEMENT; INFORMATION RETRIEVAL SYSTEMS;

EID: 8444249279     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (21)
  • 2
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraint in workflow management systems
    • Bertino, E., Ferrari, E., & Atluri, V. (1999). The specification and enforcement of authorization constraint in workflow management systems. ACM Transactions on Information and System Security, vol. 2, n°1, pp. 65-104.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 5
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control in workflow environments
    • Botha, R.A., & Eloff, J.H.P. (2001b). Separation of Duties for Access Control in Workflow Environments. IBM Systems Journal, vol. 40, no. 3, pp. 666-682.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.A.1    Eloff, J.H.P.2
  • 6
    • 8444219886 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • Casati, F., Castano, S. & Fugini, M. (1999). Managing Workflow Authorization Constraints through Active Database Technology. Information Systems Frontiers, 3, 3.
    • (1999) Information Systems Frontiers , vol.3 , pp. 3
    • Casati, F.1    Castano, S.2    Fugini, M.3
  • 11
    • 33746753690 scopus 로고    scopus 로고
    • The use of business process models for security design in organisations
    • IFIP SEC96 TC 11, Samos, Greece, Chapman & Hall, London, UK, 13-22
    • Holbein, R., Teufel, S., & Bauknecht, K. (1996b). The use of business process models for security design in organisations. In Proceedings of 20th International Conference on Information Security (IFIP SEC96 TC 11), Samos, Greece, Chapman & Hall, London, UK, 13-22.
    • (1996) Proceedings of 20th International Conference on Information Security
    • Holbein, R.1    Teufel, S.2    Bauknecht, K.3
  • 16
    • 0008235326 scopus 로고    scopus 로고
    • Security for the METEOR workflow management system
    • #UGA-CS-LSDIS-TR-99-010, University of Georgia
    • Miller, J., Fan, M., Wu, S., Arpinar, I., Sheth, A. & Kochut, K. (1999). Security for the METEOR Workflow Management System. Technical Report #UGA-CS-LSDIS-TR-99-010, University of Georgia, 33 pages.
    • (1999) Technical Report , pp. 33
    • Miller, J.1    Fan, M.2    Wu, S.3    Arpinar, I.4    Sheth, A.5    Kochut, K.6
  • 17
    • 8444251196 scopus 로고    scopus 로고
    • Realization of a context-dependent access control mechanism on a commercial platform
    • IFIP/Sec'98, part of the 15th IFIP World Computer Congress
    • Nitsche, U., Holbein, R., Morger, O., & Teufel, S. (1998). Realization of a Context-Dependent Access Control Mechanism on a Commercial Platform. In Proceedings of the 14th Int. Information Security Conf. IFIP/Sec'98, part of the 15th IFIP World Computer Congress, pp 160-170.
    • (1998) Proceedings of the 14th Int. Information Security Conf. , pp. 160-170
    • Nitsche, U.1    Holbein, R.2    Morger, O.3    Teufel, S.4
  • 20
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • Lake Tahoe, California
    • Thomas, R., & Sandhu, R. (1997). Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California.
    • (1997) Proceedings of the IFIP WG11.3 Workshop on Database Security
    • Thomas, R.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.