-
2
-
-
82355193628
-
-
Association of Certified Fraud Examiners. Report, ACFE, Austin, TX
-
Association of Certified Fraud Examiners. 2010. Report to the nations on occupational fraud and abuse. Report, ACFE, Austin, TX. http://butest.acfe.com/ rttn/rttn-2010.pdf.
-
(2010)
Report to the Nations on Occupational Fraud and Abuse
-
-
-
3
-
-
20844432808
-
Chinese wall security for decentralized workflow management systems
-
Atluri, V., S. A. Chun, P. Mazzoleni. 2004. Chinese wall security for decentralized workflow management systems. J. Comput. Security 12(6) 799-840.
-
(2004)
J. Comput. Security
, vol.12
, Issue.6
, pp. 799-840
-
-
Atluri, V.1
Chun, S.A.2
Mazzoleni, P.3
-
4
-
-
0031070705
-
Scheduling workforce and workflow in a high volume factory
-
Berman, O., R. C. Larson, E. Pinker. 1997. Scheduling workforce and workflow in a high volume factory. Management Sci. 43(2) 158-172.
-
(1997)
Management Sci.
, vol.43
, Issue.2
, pp. 158-172
-
-
Berman, O.1
Larson, R.C.2
Pinker, E.3
-
6
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., E. Ferrari, V. Atluri. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inform. System Security 2(1) 65-104.
-
(1999)
ACM Trans. Inform. System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
8
-
-
33644511399
-
Collaborative business and data privacy: Toward a cyber-control?
-
Biennier, F., J. Favrel. 2005. Collaborative business and data privacy: Toward a cyber-control? Comput. Indust. 56(4) 361-370.
-
(2005)
Comput. Indust.
, vol.56
, Issue.4
, pp. 361-370
-
-
Biennier, F.1
Favrel, J.2
-
10
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
Botha, R. A., J. H. P. Eloff. 2001. Separation of duties for access control enforcement in workflow environments. IBM Systems J. 40(3) 666-682.
-
(2001)
IBM Systems J.
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
11
-
-
41049117983
-
Specification, planning, and execution of QoS-aware grid workflows within the Amadeus environment
-
Brandic, I., S. Pllana, S. Benkner. 2008. Specification, planning, and execution of QoS-aware grid workflows within the Amadeus environment. Concurrency Comput.: Practice Experience 20(4) 331-345.
-
(2008)
Concurrency Comput.: Practice Experience
, vol.20
, Issue.4
, pp. 331-345
-
-
Brandic, I.1
Pllana, S.2
Benkner, S.3
-
12
-
-
0028515494
-
Policy resolution in workflow management systems
-
Bussler, C. J. 1994. Policy resolution in workflow management systems. Digital Tech. J. 6(4) 26-49.
-
(1994)
Digital Tech. J.
, vol.6
, Issue.4
, pp. 26-49
-
-
Bussler, C.J.1
-
13
-
-
0035594917
-
Managing workflow authorization constraints through active database technology
-
Casati, F., S. Castano, M. Fugini. 2001. Managing workflow authorization constraints through active database technology. Inform. Systems Frontiers 3(3) 319-338.
-
(2001)
Inform. Systems Frontiers
, vol.3
, Issue.3
, pp. 319-338
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
14
-
-
0003885741
-
-
Springer, New York
-
Chen, H., D. D. Yao. 2001. Fundamentals of Queueing Networks: Performance, Asymptotics, and Optimization. Springer, New York.
-
(2001)
Fundamentals of Queueing Networks: Performance, Asymptotics, and Optimization
-
-
Chen, H.1
Yao, D.D.2
-
15
-
-
58649085246
-
An ant colony optimization approach to a grid workflow scheduling problem with various QoS requirements
-
Chen, W. N., J. Zhang. 2009. An ant colony optimization approach to a grid workflow scheduling problem with various QoS requirements. IEEE Trans. Systems, Man, Cybernetics 39(1) 29-43.
-
(2009)
IEEE Trans. Systems, Man, Cybernetics
, vol.39
, Issue.1
, pp. 29-43
-
-
Chen, W.N.1
Zhang, J.2
-
16
-
-
84867531174
-
-
Computer Security Institute, Report, CSI, New York
-
Computer Security Institute. 2009. The 14th annual CSI computer crime and security survey. Report, CSI, New York. http://www.pathmaker.biz/whitepapers/ CSISurvey2009.pdf.
-
(2009)
The 14th Annual CSI Computer Crime and Security Survey
-
-
-
17
-
-
84869688548
-
IRS employee sentenced for snooping
-
Coombes, A. 2008. IRS employee sentenced for snooping. Market-Watch (August 20), http://www.marketwatch.com/story/irsworker-snooped-on-tax-records- of-almost-200-celebrities.
-
(2008)
Market-Watch (August 20)
-
-
Coombes, A.1
-
18
-
-
0033464665
-
Information privacy concerns, procedural fairness and impersonal trust: An empirical investigation
-
Culnan, M. J., P. K. Armstrong. 1999. Information privacy concerns, procedural fairness and impersonal trust: An empirical investigation. Organ. Sci. 10(1) 104-115.
-
(1999)
Organ. Sci.
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.J.1
Armstrong, P.K.2
-
19
-
-
0031605514
-
Workflow optimization through task redesign in business information processes
-
IEEE Computer Society, Washington, DC
-
Dewan, R., A. Seidmann, Z. Walter. 1998. Workflow optimization through task redesign in business information processes. Proc. 31st Annual Hawaii Internat. Conf. System Sci., Vol. 1. IEEE Computer Society, Washington, DC, 240-252.
-
(1998)
Proc. 31st Annual Hawaii Internat. Conf. System Sci.
, vol.1
, pp. 240-252
-
-
Dewan, R.1
Seidmann, A.2
Walter, Z.3
-
20
-
-
0142250279
-
Authorization and access control in adaptive workflows
-
E. Snekkenes, D. Gollmann, eds. Comput. Security-ESORICS 2003. Springer, Berlin
-
Domingos, D., A. Rito-Silva, P. Veiga. 2003. Authorization and access control in adaptive workflows. E. Snekkenes, D. Gollmann, eds. Comput. Security-ESORICS 2003. Lecture Notes Computer Science, Vol. 2808. Springer, Berlin, 23-38.
-
(2003)
Lecture Notes Computer Science
, vol.2808
, pp. 23-38
-
-
Domingos, D.1
Rito-Silva, A.2
Veiga, P.3
-
21
-
-
33646190862
-
Personal schedules for workflow systems
-
A. ter Hofstede, M. Weske, eds. Proc. Internat. Conf. Bus. Process Management. Springer, Berlin
-
Eder, J., M. Ninaus, H. Pichler. 2003. Personal schedules for workflow systems. A. ter Hofstede, M. Weske, eds. Proc. Internat. Conf. Bus. Process Management. Lecture Notes Computer Science, Vol. 2678, Springer, Berlin, 216-231.
-
(2003)
Lecture Notes Computer Science
, vol.2678
, pp. 216-231
-
-
Eder, J.1
Ninaus, M.2
Pichler, H.3
-
22
-
-
81855176591
-
-
Future Strategies Inc., Lighthouse Point, FL
-
Fischer, L., ed. 2007. BPM and Workflow Handbook. Future Strategies Inc., Lighthouse Point, FL.
-
(2007)
BPM and Workflow Handbook
-
-
Fischer, L.1
-
24
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel, R., R. D. Gopal, P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48(6) 749-764.
-
(2002)
Management Sci.
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.D.2
Goes, P.3
-
25
-
-
33646887554
-
Secure electronic markets for private information
-
Garfinkel, R., R. D. Gopal, M. A. Nunez, D. O. Rice. 2006. Secure electronic markets for private information. IEEE Trans. Systems, Man Cybernetics 36(3) 461-471.
-
(2006)
IEEE Trans. Systems, Man Cybernetics
, vol.36
, Issue.3
, pp. 461-471
-
-
Garfinkel, R.1
Gopal, R.D.2
Nunez, M.A.3
Rice, D.O.4
-
26
-
-
0010032891
-
Computational issues in secure interoperation
-
Gong, L., X. Qian. 1996. Computational issues in secure interoperation. IEEE Trans. Software Engrg. 22(1) 43-52.
-
(1996)
IEEE Trans. Software Engrg.
, vol.22
, Issue.1
, pp. 43-52
-
-
Gong, L.1
Qian, X.2
-
27
-
-
0003924156
-
-
4th ed. John Wiley & Sons, New York
-
Gross, D., J. F. Shortle, J. M. Thompson, C. M. Harris. 2008. Fundamentals of Queueing Theory, 4th ed. John Wiley & Sons, New York.
-
(2008)
Fundamentals of Queueing Theory
-
-
Gross, D.1
Shortle, J.F.2
Thompson, J.M.3
Harris, C.M.4
-
28
-
-
84867488313
-
-
GVU Center. Georgia Institute of Technology, Atlanta
-
GVU Center. 1997. GVU's seventh WWW user survey. Georgia Institute of Technology, Atlanta. http://www.cc.gatech.edu/gvu/user-surveys/survey-1997-04.
-
(1997)
GVU's Seventh WWW User Survey
-
-
-
29
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
ACM, New York
-
Hong, J. I., J. D. Ng, S. Lederer, J. A. Landay. 2004. Privacy risk models for designing privacy-sensitive ubiquitous computing systems. DIS '04: Proc. 5th Conf. Designing Interactive Systems, ACM, New York, 91-100.
-
(2004)
DIS '04: Proc. 5th Conf. Designing Interactive Systems
, pp. 91-100
-
-
Hong, J.I.1
Ng, J.D.2
Lederer, S.3
Landay, J.A.4
-
30
-
-
9544223971
-
A secure workflow model
-
Australian Computer Society, Darlinghurst, Australia
-
Hung, P. C. K., K. Karlapalem. 2003. A secure workflow model. Proc. Australasian Inform. Security Workshop, Vol. 21. Australian Computer Society, Darlinghurst, Australia, 33-41.
-
(2003)
Proc. Australasian Inform. Security Workshop
, vol.21
, pp. 33-41
-
-
Hung, P.C.K.1
Karlapalem, K.2
-
31
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
New York, USA
-
Kang, M. H., J. S. Park, J. N. Froscher. 2001. Access control mechanisms for inter-organizational workflow. Proc. 6th ACM Sympos. Access Control Models Tech. SACMAT, New York, USA, 66-74.
-
(2001)
Proc. 6th ACM Sympos. Access Control Models Tech. SACMAT
, pp. 66-74
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
32
-
-
33847045247
-
Minimizing information loss and preserving privacy
-
Menon, S., S. Sarkar. 2007. Minimizing information loss and preserving privacy. Management Sci. 53(1) 101-116.
-
(2007)
Management Sci.
, vol.53
, Issue.1
, pp. 101-116
-
-
Menon, S.1
Sarkar, S.2
-
34
-
-
1142266729
-
Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control
-
Olivero, N., P. Lunt. 2004. Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control. J. Econom. Psych. 25(2) 243-262.
-
(2004)
J. Econom. Psych.
, vol.25
, Issue.2
, pp. 243-262
-
-
Olivero, N.1
Lunt, P.2
-
35
-
-
0033489645
-
Optimistic security: A new access control paradigm
-
ACM, New York
-
Povey, D. 2000. Optimistic security: A new access control paradigm. Proc. 1999 Workshop on New Security Paradigms, ACM, New York, 40-45.
-
(2000)
Proc. 1999 Workshop on New Security Paradigms
, pp. 40-45
-
-
Povey, D.1
-
37
-
-
0042207667
-
-
2nd ed., Artech House, Norwood, MA
-
Sharp, A., P. McDermott. 2009. Workflow Modeling: Tools for Process Improvement and Applications Development, 2nd ed. Artech House, Norwood, MA.
-
(2009)
Workflow Modeling: Tools for Process Improvement and Applications Development
-
-
Sharp, A.1
McDermott, P.2
-
38
-
-
84969524477
-
Multi-criteria task assignment in workflow management systems
-
Big Island, HI
-
Shen, M., G.-H. Tzeng, D.-R. Liu. 2003. Multi-criteria task assignment in workflow management systems. 36th Annual Hawaii Internat. Conf. System Sci., Big Island, HI, 6-9.
-
(2003)
36th Annual Hawaii Internat. Conf. System Sci.
, pp. 6-9
-
-
Shen, M.1
Tzeng, G.-H.2
Liu, D.-R.3
-
39
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
Thomas, R. K. 1997. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. Proc. 2nd ACM Workshop Role-Based Access Control, ACM, New York, 13-19.
-
(1997)
Proc. 2nd ACM Workshop Role-Based Access Control, ACM, New York
, pp. 13-19
-
-
Thomas, R.K.1
-
40
-
-
24344501341
-
Access control in collaborative systems
-
Tolone, W., G.-J. Ahn, T. Pai, S.-P. Hong. 2005. Access control in collaborative systems. ACM Comput. Surveys 37(1) 29-41.
-
(2005)
ACM Comput. Surveys
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.-J.2
Pai, T.3
Hong, S.-P.4
-
41
-
-
0004002407
-
-
MIT Press, Cambridge, MA
-
van der Aalst, W., K. van Hee. 2004. Workflow Management: Models, Methods, and Systems. MIT Press, Cambridge, MA.
-
(2004)
Workflow Management: Models, Methods, and Systems
-
-
Van Der Aalst, W.1
Van Hee, K.2
-
42
-
-
84867488275
-
Obama urges inquiry into passport snooping
-
Verjee, Z., J. Yellin, T. Frieden, T. Barrett. 2008. Obama urges inquiry into passport snooping. CNN (March 21), http://www.cnn.com/2008/POLITICS/03/21/ obama.passport/index.html.
-
(2008)
CNN (March 21)
-
-
Verjee, Z.1
Yellin, J.2
Frieden, T.3
Barrett, T.4
-
43
-
-
33751436350
-
DW-RBAC: A formal security model of delegation and revocation in workflow systems
-
Wainer, J., A. Kumar, P. Barthelmess. 2007. DW-RBAC: A formal security model of delegation and revocation in workflow systems. Inform. Syststems 3(3) 365-384.
-
(2007)
Inform. Syststems
, vol.3
, Issue.3
, pp. 365-384
-
-
Wainer, J.1
Kumar, A.2
Barthelmess, P.3
-
44
-
-
0036161253
-
Authorization and access control of application data in workflow systems
-
Wu, S., A. Sheth, J. Miller, Z. Luo. 2002. Authorization and access control of application data in workflow systems. J. Intelliegent Inform. Systems. 18(1) 71-94.
-
(2002)
J. Intelliegent Inform. Systems.
, vol.18
, Issue.1
, pp. 71-94
-
-
Wu, S.1
Sheth, A.2
Miller, J.3
Luo, Z.4
-
45
-
-
33244454775
-
A taxonomy of workflow management systems for grid computing
-
Yu, J., R. Buyya. 2005. A taxonomy of workflow management systems for grid computing. J. Grid Comput. 3(3-4) 171-200.
-
(2005)
J. Grid Comput.
, vol.3
, Issue.3-4
, pp. 171-200
-
-
Yu, J.1
Buyya, R.2
-
46
-
-
33947504537
-
Scheduling scientific workflow applications with deadline and budget constraints using genetic algorithms
-
Yu, J., R. Buyya. 2006. Scheduling scientific workflow applications with deadline and budget constraints using genetic algorithms. Sci. Programming J. 14(3-4) 217-230.
-
(2006)
Sci. Programming J.
, vol.14
, Issue.3-4
, pp. 217-230
-
-
Yu, J.1
Buyya, R.2
|