-
2
-
-
0002848811
-
The specification and enforcement of authorization constraint in workflow management systems
-
Bertino, E., Ferrari, E., & Atluri, V. (1999). The specification and enforcement of authorization constraint in workflow management systems. ACM Transactions on Information and System Security, vol. 2, n°1, pp. 65-104.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
5
-
-
0034810791
-
Separation of duties for access control in workflow environments
-
Botha, R.A., & Eloff, J.H.P. (2001b). Separation of Duties for Access Control in Workflow Environments. IBM Systems Journal, vol. 40, no. 3, pp. 666-682.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
6
-
-
8444219886
-
Managing workflow authorization constraints through active database technology
-
Casati, F., Castano, S. & Fugini, M. (1999). Managing Workflow Authorization Constraints through Active Database Technology. Information Systems Frontiers, 3, 3.
-
(1999)
Information Systems Frontiers
, vol.3
, pp. 3
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
11
-
-
33746753690
-
The use of business process models for security design in organisations
-
IFIP SEC96 TC 11, Samos, Greece, Chapman & Hall, London, UK, 13-22
-
Holbein, R., Teufel, S., & Bauknecht, K. (1996b). The use of business process models for security design in organisations. In Proceedings of 20th International Conference on Information Security (IFIP SEC96 TC 11), Samos, Greece, Chapman & Hall, London, UK, 13-22.
-
(1996)
Proceedings of 20th International Conference on Information Security
-
-
Holbein, R.1
Teufel, S.2
Bauknecht, K.3
-
14
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
Chantilly, VA
-
Kang, M., Park, J. & Froscher, J. (2001). Access Control Mechanisms for Inter-Organizational Workflow. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, 66-74.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies
, pp. 66-74
-
-
Kang, M.1
Park, J.2
Froscher, J.3
-
16
-
-
0008235326
-
Security for the METEOR workflow management system
-
#UGA-CS-LSDIS-TR-99-010, University of Georgia
-
Miller, J., Fan, M., Wu, S., Arpinar, I., Sheth, A. & Kochut, K. (1999). Security for the METEOR Workflow Management System. Technical Report #UGA-CS-LSDIS-TR-99-010, University of Georgia, 33 pages.
-
(1999)
Technical Report
, pp. 33
-
-
Miller, J.1
Fan, M.2
Wu, S.3
Arpinar, I.4
Sheth, A.5
Kochut, K.6
-
17
-
-
8444251196
-
Realization of a context-dependent access control mechanism on a commercial platform
-
IFIP/Sec'98, part of the 15th IFIP World Computer Congress
-
Nitsche, U., Holbein, R., Morger, O., & Teufel, S. (1998). Realization of a Context-Dependent Access Control Mechanism on a Commercial Platform. In Proceedings of the 14th Int. Information Security Conf. IFIP/Sec'98, part of the 15th IFIP World Computer Congress, pp 160-170.
-
(1998)
Proceedings of the 14th Int. Information Security Conf.
, pp. 160-170
-
-
Nitsche, U.1
Holbein, R.2
Morger, O.3
Teufel, S.4
-
18
-
-
0030086382
-
-
IEEE Computer
-
Sandhu, R., Coyne, E., Feinstein, H. & Youman, C. (1996). 'Role-Based Access Control Models'. IEEE Computer, vol. 29, no. 2.
-
(1996)
Role-Based Access Control Models
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
20
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
Lake Tahoe, California
-
Thomas, R., & Sandhu, R. (1997). Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California.
-
(1997)
Proceedings of the IFIP WG11.3 Workshop on Database Security
-
-
Thomas, R.1
Sandhu, R.2
|