메뉴 건너뛰기




Volumn 9, Issue 5, 2012, Pages 756-769

Workflow signatures for business process compliance

Author keywords

applied cryptography; business processes; Digital signatures; security compliance

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; REGULATORY COMPLIANCE;

EID: 84864750152     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.38     Document Type: Article
Times cited : (14)

References (56)
  • 1
    • 14844363625 scopus 로고    scopus 로고
    • Service-oriented computing: Key concepts and principles
    • DOI 10.1109/MIC.2005.21
    • M. Huhns and M. Singh, "Service-Oriented Computing: Key Concepts and Principles," IEEE Internet Computing, vol. 9, no. 1, pp. 75-81, Jan./Feb. 2005. (Pubitemid 40351902)
    • (2005) IEEE Internet Computing , vol.9 , Issue.1 , pp. 75-81
    • Huhns, M.1    Singh, M.P.2
  • 2
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the fifth utility
    • June
    • R. Buyya, C. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the Fifth Utility," Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, June 2009.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 4
    • 72949096549 scopus 로고    scopus 로고
    • Cross-organizational erp management: How to create a successful business case?
    • S. Shin, and S. Ossowski, eds., Mar.
    • S. Eckartz, M. Daneva, R. Wieringa, and J.V. Hillegersberg, "Cross-Organizational ERP Management: How to Create a Successful Business Case?," Proc. ACM Symp. Applied Computing, S. Shin, and S. Ossowski, eds., pp. 1599-1604, Mar. 2009.
    • (2009) Proc. ACM Symp. Applied Computing , pp. 1599-1604
    • Eckartz, S.1    Daneva, M.2    Wieringa, R.3    Hillegersberg, J.V.4
  • 5
    • 10644247823 scopus 로고    scopus 로고
    • A case study of an inter-enterprise workflow-supported supply chain management system
    • Mar.
    • J. Liu, S. Zhang, and J. Hu, "A Case Study of an Inter-Enterprise Workflow-Supported Supply Chain Management System," Information & Management, vol. 42, no. 3, pp. 441-454, Mar. 2005.
    • (2005) Information & Management , vol.42 , Issue.3 , pp. 441-454
    • Liu, J.1    Zhang, S.2    Hu, J.3
  • 6
    • 0007548916 scopus 로고    scopus 로고
    • Crossflow: Cross-organizational workflow management for service outsourcing in dynamic virtual enterprises
    • Mar.
    • P. Grefen, K. Aberer, H. Ludwig, and Y. Hoffner, "CrossFlow: Cross-Organizational Workflow Management for Service Outsourcing in Dynamic Virtual Enterprises," IEEE Data Eng. Bull., vol. 24, no. 1, pp. 52-57, Mar. 2001.
    • (2001) IEEE Data Eng. Bull. , vol.24 , Issue.1 , pp. 52-57
    • Grefen, P.1    Aberer, K.2    Ludwig, H.3    Hoffner, Y.4
  • 8
    • 20844432808 scopus 로고    scopus 로고
    • Chinese wall security for decentralized workflow management systems
    • V. Atluri, S. Chun, and P. Mazzoleni, "Chinese Wall Security for Decentralized Workflow Management Systems," J. Computer Security, vol. 12, no. 6, pp. 799-840, Dec. 2004. (Pubitemid 41652780)
    • (2004) Journal of Computer Security , vol.12 , Issue.6 , pp. 799-840
    • Atluri, V.1    Chun, S.A.2    Mazzoleni, P.3
  • 14
    • 38049080656 scopus 로고    scopus 로고
    • Traceability and integrity of execution in distributed workflow management systems
    • J. Biskup and J. Lopez, eds.
    • F. Montagut and R. Molva, "Traceability and Integrity of Execution in Distributed Workflow Management Systems," Proc. 12th European Symp. Research in Computer Security (ESORICS '07), J. Biskup and J. Lopez, eds., pp. 251-266, 2007.
    • (2007) Proc. 12th European Symp. Research in Computer Security (ESORICS '07) , pp. 251-266
    • Montagut, F.1    Molva, R.2
  • 15
  • 16
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • D. Boneh, X. Boyen, and E. Goh, "Hierarchical Identity Based Encryption with Constant Size Ciphertext," EUROCRYPT: Proc. Advances in Cryptology, R. Cramer, ed., pp. 440-456, May 2005. (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 19
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (tbac): A family of models for active and enterprise-oriented authorization management
    • Aug.
    • R. Thomas and R. Sandhu, "Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management," Proc. 11th IFIP Int'l Conf. Database Security, pp. 166-181, Aug. 1997.
    • (1997) Proc. 11th IFIP Int'l Conf. Database Security , pp. 166-181
    • Thomas, R.1    Sandhu, R.2
  • 21
    • 0346608553 scopus 로고    scopus 로고
    • Security for workflow systems
    • DOI 10.1016/S1363-4127(01)00207-2
    • V. Atluri, "Security for Workflow Systems," Information Security technical report, vol. 6, no. 2, pp. 59-68, 2001. (Pubitemid 33663939)
    • (2001) Information Security Technical Report , vol.6 , Issue.2 , pp. 59-68
    • Atluri, V.1
  • 22
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • G. Blakley and D. Chaum, eds., Aug.
    • A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," CRYPTO: Proc. Advances in Cryptology, G. Blakley and D. Chaum, eds., pp. 47-53, Aug. 1985.
    • (1985) CRYPTO: Proc. Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 23
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," CRYPTO: Proc. Advances in Cryptology, J. Kilian, ed., pp. 213-229, Aug. 2001. (Pubitemid 33317917)
    • (2001) Lecture notes in computer science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 25
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • K. Nyberg and H. Heys, eds., Aug.
    • F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings," Proc. Ninth Int'l Workshop Selected Areas in Cryptography (SAC '02), K. Nyberg and H. Heys, eds., pp. 310-324, Aug. 2003.
    • (2003) Proc. Ninth Int'l Workshop Selected Areas in Cryptography (SAC '02) , pp. 310-324
    • Hess, F.1
  • 26
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Apr.
    • S. Goldwasser, S. Micali, and R. Rivest, "A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks," SIAM J. Computing, vol. 17, no. 2, pp. 281-308, Apr. 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 28
    • 53249117524 scopus 로고    scopus 로고
    • Pairings for cryptographers
    • Sept.
    • S. Galbraith, K. Paterson, and N. Smart, "Pairings for Cryptographers," Discrete Applied Math., vol. 156, no. 16, pp. 3113-3121, Sept. 2008.
    • (2008) Discrete Applied Math. , vol.156 , Issue.16 , pp. 3113-3121
    • Galbraith, S.1    Paterson, K.2    Smart, N.3
  • 29
    • 84864773824 scopus 로고    scopus 로고
    • MIRACL, Shamus Software Ltd.
    • MIRACL, Shamus Software Ltd., http://www.shamus.ie/, 2012.
    • (2012)
  • 30
    • 84864759544 scopus 로고    scopus 로고
    • The Pairing-Based Cryptography (PBC) Library, Stanford Univ.
    • The Pairing-Based Cryptography (PBC) Library, Stanford Univ., http://crypto.stanford.edu/pbc/, 2012.
    • (2012)
  • 31
    • 84946832010 scopus 로고    scopus 로고
    • Supersingular curves in cryptography
    • Advances in Cryptology - ASIACRYPT 2001
    • S. Galbraith, "Supersingular Curves in Cryptography," ASIACRYPT: Proc. Advances in Cryptology, C. Boyd, ed., pp. 495-513, Dec. 2001. (Pubitemid 33371203)
    • (2002) Lecture notes in computer science , Issue.2248 , pp. 495-513
    • Galbraith, S.D.1
  • 33
    • 22144445920 scopus 로고    scopus 로고
    • The weil pairing, and its efficient calculation
    • DOI 10.1007/s00145-004-0315-8
    • V. Miller, "The Weil Pairing, and Its Efficient Calculation," J. Cryptology, vol. 17, no. 4, pp. 235-261, Sept. 2004. (Pubitemid 41201458)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 235-261
    • Miller, V.S.1
  • 35
    • 33749564652 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2006/172, available at May
    • R. Granger and N. Smart, On Computing Products of Pairings, Cryptology ePrint Archive, Report 2006/172, available at http://eprint.iacr.org/2006/172, May 2006.
    • (2006) On Computing Products of Pairings
    • Granger, R.1    Smart, N.2
  • 36
    • 0011255177 scopus 로고    scopus 로고
    • Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile
    • RFC Apr.
    • R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," The Internet Eng. Task Force (IETF), vol. RFC 3280, Apr. 2002.
    • (2002) The Internet Eng. Task Force (IETF) , vol.3280
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 40
    • 63649096038 scopus 로고    scopus 로고
    • Security architecture for virtual organizations of business web services
    • Apr.
    • F. Kerschbaum and P. Robinson, "Security Architecture for Virtual Organizations of Business Web Services" J. Systems Architecture, vol. 55, no. 4, pp. 224-232, Apr. 2009.
    • (2009) J. Systems Architecture , vol.55 , Issue.4 , pp. 224-232
    • Kerschbaum, F.1    Robinson, P.2
  • 42
    • 34247861351 scopus 로고    scopus 로고
    • A static compliance-checking framework for business process models
    • DOI 10.1147/sj.462.0335
    • A. Liu, S. Müller, and K. Xu, "A Static Compliance-Checking Framework for Business Process Models," IBM Systems J., vol. 46, no. 2, pp. 335-361, Nov. 2007. (Pubitemid 46915268)
    • (2007) IBM Systems Journal , vol.46 , Issue.2 , pp. 335-361
    • Liu, Y.1    Muller, S.2    Xu, K.3
  • 43
  • 44
    • 84864763042 scopus 로고    scopus 로고
    • Pub. L. No. 107-204, 116 Stat. 745, enacted 2002-07-30, The Sarbanes-Oxley Act of 2002
    • Pub. L. No. 107-204, 116 Stat. 745, enacted 2002-07-30, The Sarbanes-Oxley Act of 2002.
  • 49
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • V. Atluri and W. Huang, "An Authorization Model for Workflows," Proc. Fourth European Symp. Research in Computer Security (ESORICS '96), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, eds., pp. 44-64, 1996. (Pubitemid 126128893)
    • (1996) Lecture notes in computer science , Issue.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.-K.2
  • 50
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Feb.
    • E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. Computer Systems, vol. 2, no. 1, pp. 65-104, Feb. 1999.
    • (1999) ACM Trans. Computer Systems , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 54
    • 26444464784 scopus 로고    scopus 로고
    • Policy-based cryptography and applications
    • Finacial Cryptography and Data Security: 9th International Conference, FC 2005. Revised Papers
    • W. Bagga and R. Molva, "Policy-Based Cryptography and Applications," Proc. Ninth Int'l Conf. Financial Cryptography and Data Security (FC '05), A. Patrick and M. Yung, eds., pp. 72-87, Feb. 2005. (Pubitemid 41425464)
    • (2005) Lecture Notes in Computer Science , vol.3570 , pp. 72-87
    • Bagga, W.1    Molva, R.2
  • 56
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • E. Biham, ed., May
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," EUROCRYPT: Proc. Advances in Cryptology, E. Biham, ed., pp. 416-432, May 2003.
    • (2003) EUROCRYPT: Proc. Advances in Cryptology , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.