메뉴 건너뛰기




Volumn 100 LNBIP, Issue PART 2, 2012, Pages 435-446

Conformance checking of RBAC policies in process-aware information systems

Author keywords

Conformance Checking; LTL; Process Aware Information Systems; Role Based Access Control; Security

Indexed keywords

ACCESS CONTROL; ENTERPRISE RESOURCE MANAGEMENT; INFORMATION SYSTEMS; TEMPORAL LOGIC;

EID: 84856573172     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-28115-0_41     Document Type: Conference Paper
Times cited : (9)

References (21)
  • 2
    • 33646698687 scopus 로고    scopus 로고
    • Process Mining and Verification of Properties: An Approach based on Temporal Logic
    • Meersman, R., Tari, Z. (eds.) OTM 2005, Part I. Springer, Heidelberg
    • van der Aalst, W.M.P., de Beer, H., van Dongen, B.: Process Mining and Verification of Properties: An Approach based on Temporal Logic. In: Meersman, R., Tari, Z. (eds.) OTM 2005, Part I. LNCS, vol. 3760, pp. 130-147. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3760 , pp. 130-147
    • Van Der Aalst, W.M.P.1    De Beer, H.2    Van Dongen, B.3
  • 7
    • 84878834015 scopus 로고    scopus 로고
    • Business Process Compliance Checking: Current State and Future Challenges
    • El Kharbili, M., Alves de Medeiros, A., Stein, S., van der Aalst, W.: Business Process Compliance Checking: Current State and Future Challenges. In: MobIS, pp. 107-113 (2008)
    • (2008) MobIS , pp. 107-113
    • El Kharbili, M.1    Alves De Medeiros, A.2    Stein, S.3    Van Der Aalst, W.4
  • 9
    • 24644445703 scopus 로고    scopus 로고
    • Conformance checking of RBAC policy and its implementation
    • Information Security Practice and Experience - First International Conference, ISPEC 2005, Proceedings
    • Hansen, F., Oleshchuk, V.: Conformance Checking of RBAC Policy and its Implementation. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 144-155. Springer, Heidelberg (2005) (Pubitemid 41273785)
    • (2005) Lecture Notes in Computer Science , vol.3439 , pp. 144-155
    • Hansen, F.1    Oleshchuk, V.2
  • 12
    • 35748949584 scopus 로고    scopus 로고
    • Conformance checking of processes based on monitoring real behavior
    • Rozinat, A., van der Aalst, W.: Conformance checking of processes based on monitoring real behavior. Information Systems 33(1), 64-95 (2008)
    • (2008) Information Systems , vol.33 , Issue.1 , pp. 64-95
    • Rozinat, A.1    Van Der Aalst, W.2
  • 14
    • 0028513932 scopus 로고
    • Access Control: Principles and Practice
    • September
    • Sandhu, R., Samarati, P.: Access Control: Principles and Practice. IEEE Communications 32(9) (September 1994)
    • (1994) IEEE Communications , vol.32 , Issue.9
    • Sandhu, R.1    Samarati, P.2
  • 15
    • 77249095368 scopus 로고    scopus 로고
    • Scenario-Driven Role Engineering
    • January/February
    • Strembeck, M.: Scenario-Driven Role Engineering. IEEE Security & Privacy 8(1) (January/February 2010)
    • (2010) IEEE Security & Privacy , vol.8 , Issue.1
    • Strembeck, M.1
  • 16
    • 79952439750 scopus 로고    scopus 로고
    • Modeling process-related RBAC models with extended UML activity models
    • Strembeck, M., Mendling, J.: Modeling process-related RBAC models with extended UML activity models. Information and Software Technology 53(5), 456-483 (2011)
    • (2011) Information and Software Technology , vol.53 , Issue.5 , pp. 456-483
    • Strembeck, M.1    Mendling, J.2
  • 17
    • 13544276885 scopus 로고    scopus 로고
    • Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
    • van der Aalst, W., de Medeiros, A.: Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance. Electronic Notes in Theoretical Computer Science 121, 3-21 (2005)
    • (2005) Electronic Notes in Theoretical Computer Science , vol.121 , pp. 3-21
    • Van Der Aalst, W.1    De Medeiros, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.