-
1
-
-
80455140371
-
Responsibility-driven design and development of process-aware security policies
-
Vienna, Austria. IEEE, August
-
M. Leitner, S. Rinderle-Ma, and J. Mangler, "Responsibility-driven design and development of process-aware security policies," in Proc. of the 6th International Conference on Availability, Reliability and Security (ARES'11), Vienna, Austria. IEEE, August 2011, pp. 334-341.
-
(2011)
Proc. of the 6th International Conference On Availability, Reliability and Security (ARES'11)
, pp. 334-341
-
-
Leitner, M.1
Rinderle-Ma, S.2
Mangler, J.3
-
2
-
-
25144499038
-
Workflow resource patterns: Identification, representation and tool support
-
Porto, Portugal, LNCS. Springer-Verlag, June
-
N. Russell, W. van der Aalst, A. H. ter Hofstede, and D. Edmond, "Workflow resource patterns: Identification, representation and tool support," in Proc. of the 17th International Conference on Advanced Information Systems Engineering (CAiSE'05), Porto, Portugal, LNCS. Springer-Verlag, June 2005, vol. 3520, pp. 216-232.
-
(2005)
Proc. of the 17th International Conference On Advanced Information Systems Engineering (CAiSE'05)
, vol.3520
, pp. 216-232
-
-
Russell, N.1
van der Aalst, W.2
Ter Hofstede, A.H.3
Edmond, D.4
-
3
-
-
0242625198
-
An approach to engineer and enforce context constraints in an RBAC environment
-
Como, Italy. ACM, June
-
G. Neumann and M. Strembeck, "An approach to engineer and enforce context constraints in an RBAC environment," in Proc. of the 8th ACM symposium on Access control models and technologies (SACMAT'03), Como, Italy. ACM, June 2003, pp. 65-79.
-
(2003)
Proc. of the 8th ACM Symposium On Access Control Models and Technologies (SACMAT'03)
, pp. 65-79
-
-
Neumann, G.1
Strembeck, M.2
-
4
-
-
9544223971
-
A secure workflow model
-
Adelaide, Australia, Australian Computer Society, February
-
P. C. K. Hung and K. Karlapalem, "A secure workflow model," in Proc. of the Australasian information security workshop (AISW'03), Adelaide, Australia, vol. 21. Australian Computer Society, February 2003, pp. 33-41.
-
(2003)
Proc. of the Australasian Information Security Workshop (AISW'03)
, vol.21
, pp. 33-41
-
-
Hung, P.C.K.1
Karlapalem, K.2
-
5
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
February
-
E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Transactions on Information and System Security, vol. 2, no. 1, pp. 65-104, February 1999.
-
(1999)
ACM Transactions On Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
6
-
-
33646698687
-
Process mining and verification of properties: An approach based on temporal logic
-
Agia Napa, Cyprus, LNCS, Springer-Verlag, October-November
-
W. M. P. van der Aalst, H. de Beer, and B. van Dongen, "Process mining and verification of properties: An approach based on temporal logic," in Proc. of the 13th International Conference on Cooperative Information Systems (CoopIS'05), Agia Napa, Cyprus, LNCS, vol. 3761. Springer-Verlag, October-November 2005, pp. 130-147.
-
(2005)
Proc. of the 13th International Conference On Cooperative Information Systems (CoopIS'05)
, vol.3761
, pp. 130-147
-
-
van der Aalst, W.M.P.1
de Beer, H.2
van Dongen, B.3
-
7
-
-
84874274461
-
Integration of process constraints from heterogeneous sources in Process-Aware information systems
-
Hamburg, Germany, LNI. Gesellschaft für Informatik, September
-
S. Rinderle-Ma and J. Mangler, "Integration of process constraints from heterogeneous sources in Process-Aware information systems," in Proc. of the 4th International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA'11), Hamburg, Germany, LNI. Gesellschaft für Informatik, September 2011, pp. 51-64.
-
(2011)
Proc. of the 4th International Workshop On Enterprise Modelling and Information Systems Architectures (EMISA'11)
, pp. 51-64
-
-
Rinderle-Ma, S.1
Mangler, J.2
-
9
-
-
79952372864
-
On evolving organizational models without losing control on authorization constraints in web service orchestrations
-
Shanghai, China. IEEE Computer Society, November
-
S. Rinderle-Ma and M. Leitner, "On evolving organizational models without losing control on authorization constraints in web service orchestrations," in Proc. of the 12th IEEE International Conference on Commerce and Enterprise Computing (CEC'10), Shanghai, China. IEEE Computer Society, November 2010, pp. 128-135.
-
(2010)
Proc. of the 12th IEEE International Conference On Commerce and Enterprise Computing (CEC'10)
, pp. 128-135
-
-
Rinderle-Ma, S.1
Leitner, M.2
-
10
-
-
3142523603
-
The UCON ABC usage control model
-
February, [Online]. Available
-
J. Park and R. Sandhu, "The UCON ABC usage control model," ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 128-174, February 2004. [Online]. Available: http://doi.acm.org/10.1145/984334.984339
-
(2004)
ACM Transactions On Information and System Security
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
11
-
-
27644461562
-
Analyzing goal semantics for rights, permissions, and obligations
-
Paris, France. IEEE, September
-
T. D. Breaux and A. I. Anton, "Analyzing goal semantics for rights, permissions, and obligations," in Proc. of the 13th IEEE International Conference on Requirements Engineering (RE'05), Paris, France. IEEE, September 2005, pp. 177-186.
-
(2005)
Proc. of the 13th IEEE International Conference On Requirements Engineering (RE'05)
, pp. 177-186
-
-
Breaux, T.D.1
Anton, A.I.2
-
12
-
-
15744398074
-
Specifying and analyzing early requirements in tropos
-
May
-
A. Fuxman, L. Liu, J. Mylopoulos, M. Pistore, M. Roveri, and P. Traverso, "Specifying and analyzing early requirements in tropos," Requirements Engineering, vol. 9, no. 2, pp. 132-150, May 2004.
-
(2004)
Requirements Engineering
, vol.9
, Issue.2
, pp. 132-150
-
-
Fuxman, A.1
Liu, L.2
Mylopoulos, J.3
Pistore, M.4
Roveri, M.5
Traverso, P.6
-
13
-
-
34748841665
-
Research directions in requirements engineering
-
Minneapolis, Minnesota, USA. IEEE, May
-
B. H. C. Cheng and J. M. Atlee, "Research directions in requirements engineering," in Proc. of the Workshop on the Future of Software Engineering (FOSE'07), Minneapolis, Minnesota, USA. IEEE, May 2007, pp. 285-303.
-
(2007)
Proc. of the Workshop On the Future of Software Engineering (FOSE'07)
, pp. 285-303
-
-
Cheng, B.H.C.1
Atlee, J.M.2
-
14
-
-
34147190948
-
Business process mining: An industrial application
-
July
-
W. M. P. van der Aalst, H. Reijers, A. Weijters, B. van Dongen, A. Alves de Medeiros, M. Song, and H. Verbeek, "Business process mining: An industrial application," Information Systems, vol. 32, no. 5, pp. 713-732, July 2007.
-
(2007)
Information Systems
, vol.32
, Issue.5
, pp. 713-732
-
-
van der Aalst, W.M.P.1
Reijers, H.2
Weijters, A.3
van Dongen, B.4
de Medeiros, A.A.5
Song, M.6
Verbeek, H.7
-
15
-
-
47649094419
-
Role engineering
-
Gaithersburg, Maryland, USA. ACM, November-December
-
E. J. Coyne, "Role engineering," in Proc. of the 1st ACM Workshop on Role-based access control (RBAC'95), Gaithersburg, Maryland, USA. ACM, November-December 1996.
-
(1996)
Proc. of the 1st ACM Workshop On Role-based Access Control (RBAC'95)
-
-
Coyne, E.J.1
-
16
-
-
0242709332
-
A scenario-driven role engineering process for functional RBAC roles
-
Monterey, California, USA. ACM, June
-
G. Neumann and M. Strembeck, "A scenario-driven role engineering process for functional RBAC roles," in Proc. of the 7th ACM symposium on Access control models and technologies (SACMAT'02), Monterey, California, USA. ACM, June 2002, pp. 33-42.
-
(2002)
Proc. of the 7th ACM Symposium On Access Control Models and Technologies (SACMAT'02)
, pp. 33-42
-
-
Neumann, G.1
Strembeck, M.2
-
17
-
-
0242625194
-
Role mining - revealing business roles for security administration using data mining technology
-
Como, Italy. ACM, June
-
M. Kuhlmann, D. Shohat, and G. Schimpf, "Role mining - revealing business roles for security administration using data mining technology," in Proc. of the 8th ACM symposium on Access control models and technologies (SACMAT'03), Como, Italy. ACM, June 2003, pp. 179-186.
-
(2003)
Proc. of the 8th ACM Symposium On Access Control Models and Technologies (SACMAT'03)
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
18
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Berlin, Germany. ACM, July
-
R. Sandhu, D. Ferraiolo, and R. Kuhn, "The NIST model for role-based access control: towards a unified standard," in Proc. of the 5th ACM workshop on Role-based access control (RBAC'00), Berlin, Germany. ACM, July 2000, pp. 47-63.
-
(2000)
Proc. of the 5th ACM Workshop On Role-based Access Control (RBAC'00)
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
19
-
-
84948950552
-
A model for attribute-based user-role assignment
-
Las Vegas, Nevada, USA. IEEE, December
-
M. A. Al-Kahtani and R. Sandhu, "A model for attribute-based user-role assignment," in Proc. of the 18th Annual Computer Security Applications Conference (ACSAC'02), Las Vegas, Nevada, USA. IEEE, December 2002, pp. 353-362.
-
(2002)
Proc. of the 18th Annual Computer Security Applications Conference (ACSAC'02)
, pp. 353-362
-
-
Al-Kahtani, M.A.1
Sandhu, R.2
-
20
-
-
67349148780
-
Providing integrated life cycle support in Process-Aware information systems
-
March
-
B. Weber, M. Reichert, W. Wild, and S. Rinderle-Ma, "Providing integrated life cycle support in Process-Aware information systems." International Journal of Cooperative Information Systems, vol. 18, no. 1, pp. 115-165, March 2009.
-
(2009)
International Journal of Cooperative Information Systems
, vol.18
, Issue.1
, pp. 115-165
-
-
Weber, B.1
Reichert, M.2
Wild, W.3
Rinderle-Ma, S.4
-
21
-
-
33749635457
-
A declarative approach for flexible business processes management
-
Vienna, Austria, LNCS, Springer-Verlag, September
-
M. Pesic and W. van der Aalst, "A declarative approach for flexible business processes management," in Proc. of the 1st International Workshop on Dynamic Process Management (DPM'06), Vienna, Austria, LNCS, vol. 4103. Springer-Verlag, September 2006, pp. 169-180.
-
(2006)
Proc. of the 1st International Workshop On Dynamic Process Management (DPM'06)
, vol.4103
, pp. 169-180
-
-
Pesic, M.1
van der Aalst, W.2
-
22
-
-
0032627183
-
Formalization and verification of event-driven process chains
-
July
-
W. M. P. van der Aalst, "Formalization and verification of event-driven process chains," Information & Software Technology, vol. 41, no. 10, pp. 639-650, July 1999.
-
(1999)
Information & Software Technology
, vol.41
, Issue.10
, pp. 639-650
-
-
van der Aalst, W.M.P.1
-
23
-
-
52449135365
-
Verification of workflow nets
-
Toulouse, France, LNCS, Springer-Verlag, June
-
W. M. P. van der Aalst, "Verification of workflow nets," in Proc. of the 18th International Conference on Application and Theory of Petri Nets (ICATPN'97), Toulouse, France, LNCS, vol. 1248. Springer-Verlag, June 1997, pp. 407-426.
-
(1997)
Proc. of the 18th International Conference On Application and Theory of Petri Nets (ICATPN'97)
, vol.1248
, pp. 407-426
-
-
van der Aalst, W.M.P.1
-
24
-
-
38049132539
-
Modeling of Task-Based authorization constraints in BPMN
-
Brisbane, Australia, LNCS, Springer-Verlag, September
-
C. Wolter and A. Schaad, "Modeling of Task-Based authorization constraints in BPMN," in Proc. of the 5th International Conference on Business Process Management (BPM'07), Brisbane, Australia, LNCS, vol. 4714. Springer-Verlag, September 2007, pp. 64-79.
-
(2007)
Proc. of the 5th International Conference On Business Process Management (BPM'07)
, vol.4714
, pp. 64-79
-
-
Wolter, C.1
Schaad, A.2
-
25
-
-
33745158627
-
Resource-Constrained workflow nets
-
June
-
K. v. Hee, N. Sidorova, and M. Voorhoeve, "Resource-Constrained workflow nets," Fundamenta Informati-cae, vol. 71, no. 2-3, pp. 243-257, June 2006.
-
(2006)
Fundamenta Informati-cae
, vol.71
, Issue.2-3
, pp. 243-257
-
-
Hee, K.V.1
Sidorova, N.2
Voorhoeve, M.3
-
26
-
-
77953983420
-
From ADEPT to AristaFlow BPM suite: A research vision has become reality
-
Ulm, Germany, LNBIP, Springer-Verlag, September
-
P. Dadam, M. Reichert, S. Rinderle-Ma, A. Lanz, R. Pryss, M. Predeschly, J. Kolb, L. T. Ly, M. Jurisch, U. Kreher et al., "From ADEPT to AristaFlow BPM suite: A research vision has become reality," in Proc. of the 1st International Workshop on Empirical Research in Business Process Management (ER-BPM'09), Ulm, Germany, LNBIP, vol. 43. Springer-Verlag, September 2009.
-
(2009)
Proc. of the 1st International Workshop On Empirical Research In Business Process Management (ER-BPM'09)
, vol.43
-
-
Dadam, P.1
Reichert, M.2
Rinderle-Ma, S.3
Lanz, A.4
Pryss, R.5
Predeschly, M.6
Kolb, J.7
Ly, L.T.8
Jurisch, M.9
Kreher, U.10
-
27
-
-
79551517853
-
SeaFlows toolset - compliance verification made easy for Process-Aware information systems
-
Hammamet, Tunisia, LNBIP, Springer-Verlag, January
-
L. T. Ly, D. Knuplesch, S. Rinderle-Ma, K. Goser, H. Pfeifer, M. Reichert, and P. Dadam, "SeaFlows toolset - compliance verification made easy for Process-Aware information systems," in Proc. of the 22nd International Conference on Advanced Information Systems Engineering (CAiSE'10), Hammamet, Tunisia, LNBIP, vol. 72. Springer-Verlag, January 2011, pp. 76-91.
-
(2011)
Proc. of the 22nd International Conference On Advanced Information Systems Engineering (CAiSE'10)
, vol.72
, pp. 76-91
-
-
Ly, L.T.1
Knuplesch, D.2
Rinderle-Ma, S.3
Goser, K.4
Pfeifer, H.5
Reichert, M.6
Dadam, P.7
-
28
-
-
47949131563
-
DECLARE: Full support for Loosely-Structured processes
-
Annapolis, Maryland, USA. IEEE, October
-
M. Pesic, H. Schonenberg, and W. v. d. Aalst, "DECLARE: full support for Loosely-Structured processes." in Proc. of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC'07), Annapolis, Maryland, USA. IEEE, October 2007, pp. 287-300.
-
(2007)
Proc. of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC'07)
, pp. 287-300
-
-
Pesic, M.1
Schonenberg, H.2
van der Aalst, W.3
-
29
-
-
15744405522
-
YAWL: Yet another workflow language
-
June
-
W. M. P. van der Aalst and A. H. M. Ter Hofstede, "YAWL: yet another workflow language," Information Systems, vol. 30, no. 4, pp. 245-275, June 2005.
-
(2005)
Information Systems
, vol.30
, Issue.4
, pp. 245-275
-
-
van der Aalst, W.M.P.1
ter Hofstede, A.H.M.2
-
30
-
-
79956313469
-
Design and verification of instantiable compliance rule graphs in Process-Aware information systems
-
Hammamet, Tunisia, LNCS, Springer-Verlag, June
-
L. Ly, S. Rinderle-Ma, and P. Dadam, "Design and verification of instantiable compliance rule graphs in Process-Aware information systems," in Proc. of the 22nd International Conference on Advanced Information Systems Engineering (CAiSE'10), Hammamet, Tunisia, LNCS, vol. 6051. Springer-Verlag, June 2010, pp. 9-23.
-
(2010)
Proc. of the 22nd International Conference On Advanced Information Systems Engineering (CAiSE'10)
, vol.6051
, pp. 9-23
-
-
Ly, L.1
Rinderle-Ma, S.2
Dadam, P.3
-
31
-
-
78449262411
-
On enabling integrated process compliance with semantic constraints in process management systems - requirements, challenges, solutions
-
June
-
T. Ly, S. Rinderle-Ma, K. Goser, and P. Dadam, "On enabling integrated process compliance with semantic constraints in process management systems - requirements, challenges, solutions," Information Systems Frontiers, pp. 1-25, June 2009.
-
(2009)
Information Systems Frontiers
, pp. 1-25
-
-
Ly, T.1
Rinderle-Ma, S.2
Goser, K.3
Dadam, P.4
-
32
-
-
33746354903
-
-
Specification Version 1.0, June, last accessed 12/15/2011. [Online]. Available
-
A. Agrawal, M. Amend, M. Das, M. Ford, C. Keller, M. Kloppmann, D. Konig, F. Leymann, R. Muller, G. Pfau, K. Plosser, R. Rangaswamy, A. Rickayzen, M. Rowley, P. Schmidt, P. Trickovic, A. Yiu, and M. Zeller, "WS-BPEL extension for people (BPEL4People)," Specification Version 1.0, June 2007, http://download.boulder.ibm.com/ibmdl/pub/software/dw/specs/ws-bpel4people/BPEL4Peoplev1.pdf, last accessed 12/15/2011. [Online]. Available
-
(2007)
WS-BPEL Extension For People (BPEL4People)
-
-
Agrawal, A.1
Amend, M.2
Das, M.3
Ford, M.4
Keller, C.5
Kloppmann, M.6
Konig, D.7
Leymann, F.8
Muller, R.9
Pfau, G.10
Plosser, K.11
Rangaswamy, R.12
Rickayzen, A.13
Rowley, M.14
Schmidt, P.15
Trickovic, P.16
Yiu, A.17
Zeller, M.18
-
33
-
-
81255207847
-
Detecting and resolving conflicts of Mutual-Exclusion and binding constraints in a business process context
-
Crete, Greece, LNCS, Springer-Verlag, October
-
S. Schefer, M. Strembeck, J. Mendling, and A. Baumgrass, "Detecting and resolving conflicts of Mutual-Exclusion and binding constraints in a business process context," in Proc. of the 19th International Conference on Cooperative Information Systems (CoopIS'11), Crete, Greece, LNCS, vol. 7044. Springer-Verlag, October 2011, pp. 329-346.
-
(2011)
Proc. of the 19th International Conference On Cooperative Information Systems (CoopIS'11)
, vol.7044
, pp. 329-346
-
-
Schefer, S.1
Strembeck, M.2
Mendling, J.3
Baumgrass, A.4
-
34
-
-
70449688135
-
Comprehensive life cycle support for access rules in information systems: The CEOSIS project
-
July
-
S. Rinderle-Ma and M. Reichert, "Comprehensive life cycle support for access rules in information systems: The CEOSIS project," Enterprise Information Systems, vol. 3, no. 3, pp. 219-251, July 2009.
-
(2009)
Enterprise Information Systems
, vol.3
, Issue.3
, pp. 219-251
-
-
Rinderle-Ma, S.1
Reichert, M.2
-
35
-
-
77950236499
-
Building a modular service oriented workflow engine
-
Taipei, Taiwan. IEEE, January
-
G. Sturmer, J. Mangler, and E. Schikuta, "Building a modular service oriented workflow engine," in Proc. of the IEEE International Conference on Service-Oriented Computing and Applications (SOCA'09), Taipei, Taiwan. IEEE, January 2009, pp. 1-4.
-
(2009)
Proc. of the IEEE International Conference On Service-Oriented Computing and Applications (SOCA'09)
, pp. 1-4
-
-
Sturmer, G.1
Mangler, J.2
Schikuta, E.3
-
36
-
-
0348209180
-
W-RBAC - a workflow security model incorporating controlled overriding of constraints
-
December
-
J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC - a workflow security model incorporating controlled overriding of constraints," International Journal of Cooperative Information Systems, vol. 12, no. 4, pp. 455-485, December 2003.
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
37
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
February
-
R. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles," ACM Transactions on Information and System Security, vol. 2, no. 1, pp. 105-135, February 1999.
-
(1999)
ACM Transactions On Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
38
-
-
0035594917
-
Managing workflow authorization constraints through active database technology
-
September
-
F. Casati, S. Castano, and M. Fugini, "Managing workflow authorization constraints through active database technology," Information Systems Frontiers, vol. 3, no. 3, pp. 319-338, September 2001.
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
, pp. 319-338
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
39
-
-
85117415611
-
Verifying workflow processes against organization security policies
-
Stanford, California, USA. IEEE, June
-
C. Ribeiro and P. Guedes, "Verifying workflow processes against organization security policies," in Proc. of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises (WETICE'99), Stanford, California, USA. IEEE, June 1999, pp. 190-191.
-
(1999)
Proc. of the 8th Workshop On Enabling Technologies On Infrastructure For Collaborative Enterprises (WETICE'99)
, pp. 190-191
-
-
Ribeiro, C.1
Guedes, P.2
|