메뉴 건너뛰기




Volumn , Issue , 2012, Pages 70-79

A generic business artifacts based authorization framework for cross-enterprise collaboration

Author keywords

Business artifact (a.k.a business entity with lifecycle); Business process management; Cross enterprise collaboration; Service interoperation

Indexed keywords

ACCESS CONTROL MECHANISM; ARTIFACT-CENTRIC; AUTHORIZATION FRAMEWORKS; BUSINESS OBJECTIVES; BUSINESS PROCESS MANAGEMENT; CONVENTIONAL SERVICES; COOPERATIVE INTERACTIONS; DATA CENTRIC; ENTERPRISE COLLABORATION; INTEROPERATIONS; MULTIPLE ORGANIZATIONS;

EID: 84870824046     PISSN: 21660778     EISSN: 21660786     Source Type: Conference Proceeding    
DOI: 10.1109/SRII.2012.19     Document Type: Conference Paper
Times cited : (17)

References (22)
  • 2
    • 0141940583 scopus 로고    scopus 로고
    • Business artifacts: An approach to operational specification
    • A. Nigam and N. S. Caswell, "Business artifacts: An approach to operational specification, " IBM Systems Journal, vol. 42, no. 3, pp. 428-445, 2003.
    • (2003) IBM Systems Journal , vol.42 , Issue.3 , pp. 428-445
    • Nigam, A.1    Caswell, N.S.2
  • 3
    • 85099426094 scopus 로고    scopus 로고
    • Artifact-centric business process models: Brief survey of research results and challenges
    • R. Hull, "Artifact-centric business process models: Brief survey of research results and challenges, " On the Move to Meaningful Internet Systems: OTM 2008, pp. 1152-1163, 2008.
    • (2008) On the Move to Meaningful Internet Systems: OTM 2008 , pp. 1152-1163
    • Hull, R.1
  • 5
    • 85087468070 scopus 로고    scopus 로고
    • Business artifacts: A data-centric approach to modeling business operations and processes
    • R. Cohn, D. and Hull, "Business artifacts: A data-centric approach to modeling business operations and processes, " IEEE Data Eng. Bull, vol. 32, no. 3, pp. 3-9, 2009.
    • (2009) IEEE Data Eng. Bull , vol.32 , Issue.3 , pp. 3-9
    • Cohn, R.1    Hull, D.2
  • 8
    • 80051952792 scopus 로고    scopus 로고
    • Business artifacts with guard-stage-milestone lifecycles: Managing artifact interactions with conditions and events
    • R. Hull et al., "Business Artifacts with Guard-Stage-Milestone Lifecycles: Managing Artifact Interactions with Conditions and Events, " in ACM Intl. Conf. on Distributed Event-based Systems (DEBS), 2011.
    • (2011) ACM Intl. Conf. on Distributed Event-based Systems (DEBS)
    • Hull, R.1
  • 11
    • 84870786150 scopus 로고    scopus 로고
    • Barcelona: A design and runtime environment for modeling and execution of artifact-centric business processes
    • R. V. and R. H. Terry Heath, demo track
    • R. V. and R. H. Terry Heath, "Barcelona: A design and runtime environment for modeling and execution of artifact-centric business processes, " in BPM'2011 demo track, 2011.
    • (2011) BPM'2011
  • 12
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • M. D. Saltzer, J.H. and Schroeder, "The protection of information in computer systems, " Proceedings of the IEEE, vol. 63, no. 9, pp. 1278-1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, M.D.1    Schroeder, J.H.2
  • 15
    • 0002673327 scopus 로고    scopus 로고
    • An authorization model for workflows
    • V. Atluri and W. Huang, "An authorization model for workflows, " in Computer Security-ESORICS 96, 1996, pp. 44-64.
    • (1996) Computer Security-ESORICS , vol.96 , pp. 44-64
    • Atluri, V.1    Huang, W.2
  • 16
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems, " ACM Transactions on Information and System Security (TISSEC), vol. 2, no. 1, pp. 65-104, 1999.
    • (1999) ACM Transactions on Information and System Security (TISSEC) , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 18
    • 0034804104 scopus 로고    scopus 로고
    • Access control in document-centric workflow systems-an agent-based approach
    • R. A. Botha and J. H. P. Eloff, "Access control in document-centric workflow systems-an agent-based approach, " Computers & Security, vol. 20, no. 6, pp. 525-532, 2001.
    • (2001) Computers & Security , vol.20 , Issue.6 , pp. 525-532
    • Botha, R.A.1    Eloff, J.H.P.2
  • 19
    • 0024863856 scopus 로고
    • An access authorization model for relational databases based on algebraic manipulation of view definitions
    • A. Motro, "An access authorization model for relational databases based on algebraic manipulation of view definitions, " in Data Engineering, 1989. Proceedings. Fifth International Conference on, 1989, pp. 339-347.
    • (1989) Data Engineering, 1989. Proceedings. Fifth International Conference on , pp. 339-347
    • Motro, A.1
  • 22
    • 84870803217 scopus 로고    scopus 로고
    • Security administration for federations, warehouses, and other derived data
    • 2000
    • A. Rosenthal, E. Sciore, and V. Doshi, "Security administration for federations, warehouses, and other derived data, " in Proceedings of the IFIP WG, 2000, vol. 11, pp. 209-223.
    • Proceedings of the IFIP WG , vol.11 , pp. 209-223
    • Rosenthal, A.1    Sciore, E.2    Doshi, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.