-
1
-
-
75649128717
-
Facilitating workflow interoperation using artifact-centric hubs
-
R. Hull, N. Narendra, and A. Nigam, "Facilitating workflow interoperation using artifact-centric hubs, " Proc. Intl. Conf. on Service-Oriented Computing (ICSOC), pp. 1-18, 2009.
-
(2009)
Proc. Intl. Conf. on Service-Oriented Computing (ICSOC)
, pp. 1-18
-
-
Hull, R.1
Narendra, N.2
Nigam, A.3
-
2
-
-
0141940583
-
Business artifacts: An approach to operational specification
-
A. Nigam and N. S. Caswell, "Business artifacts: An approach to operational specification, " IBM Systems Journal, vol. 42, no. 3, pp. 428-445, 2003.
-
(2003)
IBM Systems Journal
, vol.42
, Issue.3
, pp. 428-445
-
-
Nigam, A.1
Caswell, N.S.2
-
3
-
-
85099426094
-
Artifact-centric business process models: Brief survey of research results and challenges
-
R. Hull, "Artifact-centric business process models: Brief survey of research results and challenges, " On the Move to Meaningful Internet Systems: OTM 2008, pp. 1152-1163, 2008.
-
(2008)
On the Move to Meaningful Internet Systems: OTM 2008
, pp. 1152-1163
-
-
Hull, R.1
-
5
-
-
85087468070
-
Business artifacts: A data-centric approach to modeling business operations and processes
-
R. Cohn, D. and Hull, "Business artifacts: A data-centric approach to modeling business operations and processes, " IEEE Data Eng. Bull, vol. 32, no. 3, pp. 3-9, 2009.
-
(2009)
IEEE Data Eng. Bull
, vol.32
, Issue.3
, pp. 3-9
-
-
Cohn, R.1
Hull, D.2
-
6
-
-
33746219876
-
ADoc- oriented programming
-
K. B. P. Nandi, S. Kumaran, J. Chung, T. Heath, R. Das, "ADoc- Oriented Programming, " in The 2003 International Symposium on Applications and the Internet (SAINT'2003), 2003.
-
(2003)
The 2003 International Symposium on Applications and the Internet (SAINT'2003)
-
-
Nandi, K.B.P.1
Kumaran, S.2
Chung, J.3
Heath, T.4
Das, R.5
-
7
-
-
58049097199
-
Siena: From powerpoint to web app in 5 minutes
-
D. Cohn, P. Dhoolia, F. Heath, F. Pinel, and J. Vergo, "Siena: From PowerPoint to Web App in 5 Minutes, " Service-Oriented Computing- -ICSOC 2008, pp. 722-723, 2008.
-
(2008)
Service-Oriented Computing- -ICSOC 2008
, pp. 722-723
-
-
Cohn, D.1
Dhoolia, P.2
Heath, F.3
Pinel, F.4
Vergo, J.5
-
8
-
-
80051952792
-
Business artifacts with guard-stage-milestone lifecycles: Managing artifact interactions with conditions and events
-
R. Hull et al., "Business Artifacts with Guard-Stage-Milestone Lifecycles: Managing Artifact Interactions with Conditions and Events, " in ACM Intl. Conf. on Distributed Event-based Systems (DEBS), 2011.
-
(2011)
ACM Intl. Conf. on Distributed Event-based Systems (DEBS)
-
-
Hull, R.1
-
11
-
-
84870786150
-
Barcelona: A design and runtime environment for modeling and execution of artifact-centric business processes
-
R. V. and R. H. Terry Heath, demo track
-
R. V. and R. H. Terry Heath, "Barcelona: A design and runtime environment for modeling and execution of artifact-centric business processes, " in BPM'2011 demo track, 2011.
-
(2011)
BPM'2011
-
-
-
12
-
-
0016555241
-
The protection of information in computer systems
-
M. D. Saltzer, J.H. and Schroeder, "The protection of information in computer systems, " Proceedings of the IEEE, vol. 63, no. 9, pp. 1278-1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, M.D.1
Schroeder, J.H.2
-
15
-
-
0002673327
-
An authorization model for workflows
-
V. Atluri and W. Huang, "An authorization model for workflows, " in Computer Security-ESORICS 96, 1996, pp. 44-64.
-
(1996)
Computer Security-ESORICS
, vol.96
, pp. 44-64
-
-
Atluri, V.1
Huang, W.2
-
16
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems, " ACM Transactions on Information and System Security (TISSEC), vol. 2, no. 1, pp. 65-104, 1999.
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
17
-
-
84949526405
-
A prototype secure workflow server
-
D. L. Long, J. Baker, and F. Fung, "A prototype secure workflow server, " in Computer Security Applications Conference, 1999.(ACSAC'99) Proceedings. 15th Annual, 1999, pp. 129-133.
-
(1999)
Computer Security Applications Conference, 1999.(ACSAC'99) Proceedings. 15th Annual
, pp. 129-133
-
-
Long, D.L.1
Baker, J.2
Fung, F.3
-
18
-
-
0034804104
-
Access control in document-centric workflow systems-an agent-based approach
-
R. A. Botha and J. H. P. Eloff, "Access control in document-centric workflow systems-an agent-based approach, " Computers & Security, vol. 20, no. 6, pp. 525-532, 2001.
-
(2001)
Computers & Security
, vol.20
, Issue.6
, pp. 525-532
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
19
-
-
0024863856
-
An access authorization model for relational databases based on algebraic manipulation of view definitions
-
A. Motro, "An access authorization model for relational databases based on algebraic manipulation of view definitions, " in Data Engineering, 1989. Proceedings. Fifth International Conference on, 1989, pp. 339-347.
-
(1989)
Data Engineering, 1989. Proceedings. Fifth International Conference on
, pp. 339-347
-
-
Motro, A.1
-
20
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy, "Extending query rewriting techniques for fine-grained access control, " in Proceedings of the 2004 ACM SIGMOD international conference on Management of data, 2004, pp. 551-562.
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
22
-
-
84870803217
-
Security administration for federations, warehouses, and other derived data
-
2000
-
A. Rosenthal, E. Sciore, and V. Doshi, "Security administration for federations, warehouses, and other derived data, " in Proceedings of the IFIP WG, 2000, vol. 11, pp. 209-223.
-
Proceedings of the IFIP WG
, vol.11
, pp. 209-223
-
-
Rosenthal, A.1
Sciore, E.2
Doshi, V.3
|