메뉴 건너뛰기




Volumn 2, Issue 4, 2011, Pages 4-26

Sprint*- Responsibilities: Design and development of security policies in process-aware information systems

Author keywords

Access control; Process aware information systems; Responsibilities; Security constraints; Security policy design; Workflow security

Indexed keywords


EID: 84874423015     PISSN: 20935374     EISSN: 20935382     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (39)
  • 5
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • February
    • E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Transactions on Information and System Security, vol. 2, no. 1, pp. 65-104, February 1999.
    • (1999) ACM Transactions On Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 9
    • 79952372864 scopus 로고    scopus 로고
    • On evolving organizational models without losing control on authorization constraints in web service orchestrations
    • Shanghai, China. IEEE Computer Society, November
    • S. Rinderle-Ma and M. Leitner, "On evolving organizational models without losing control on authorization constraints in web service orchestrations," in Proc. of the 12th IEEE International Conference on Commerce and Enterprise Computing (CEC'10), Shanghai, China. IEEE Computer Society, November 2010, pp. 128-135.
    • (2010) Proc. of the 12th IEEE International Conference On Commerce and Enterprise Computing (CEC'10) , pp. 128-135
    • Rinderle-Ma, S.1    Leitner, M.2
  • 10
    • 3142523603 scopus 로고    scopus 로고
    • The UCON ABC usage control model
    • February, [Online]. Available
    • J. Park and R. Sandhu, "The UCON ABC usage control model," ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 128-174, February 2004. [Online]. Available: http://doi.acm.org/10.1145/984334.984339
    • (2004) ACM Transactions On Information and System Security , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 21
    • 33749635457 scopus 로고    scopus 로고
    • A declarative approach for flexible business processes management
    • Vienna, Austria, LNCS, Springer-Verlag, September
    • M. Pesic and W. van der Aalst, "A declarative approach for flexible business processes management," in Proc. of the 1st International Workshop on Dynamic Process Management (DPM'06), Vienna, Austria, LNCS, vol. 4103. Springer-Verlag, September 2006, pp. 169-180.
    • (2006) Proc. of the 1st International Workshop On Dynamic Process Management (DPM'06) , vol.4103 , pp. 169-180
    • Pesic, M.1    van der Aalst, W.2
  • 22
    • 0032627183 scopus 로고    scopus 로고
    • Formalization and verification of event-driven process chains
    • July
    • W. M. P. van der Aalst, "Formalization and verification of event-driven process chains," Information & Software Technology, vol. 41, no. 10, pp. 639-650, July 1999.
    • (1999) Information & Software Technology , vol.41 , Issue.10 , pp. 639-650
    • van der Aalst, W.M.P.1
  • 24
  • 25
    • 33745158627 scopus 로고    scopus 로고
    • Resource-Constrained workflow nets
    • June
    • K. v. Hee, N. Sidorova, and M. Voorhoeve, "Resource-Constrained workflow nets," Fundamenta Informati-cae, vol. 71, no. 2-3, pp. 243-257, June 2006.
    • (2006) Fundamenta Informati-cae , vol.71 , Issue.2-3 , pp. 243-257
    • Hee, K.V.1    Sidorova, N.2    Voorhoeve, M.3
  • 29
    • 15744405522 scopus 로고    scopus 로고
    • YAWL: Yet another workflow language
    • June
    • W. M. P. van der Aalst and A. H. M. Ter Hofstede, "YAWL: yet another workflow language," Information Systems, vol. 30, no. 4, pp. 245-275, June 2005.
    • (2005) Information Systems , vol.30 , Issue.4 , pp. 245-275
    • van der Aalst, W.M.P.1    ter Hofstede, A.H.M.2
  • 31
    • 78449262411 scopus 로고    scopus 로고
    • On enabling integrated process compliance with semantic constraints in process management systems - requirements, challenges, solutions
    • June
    • T. Ly, S. Rinderle-Ma, K. Goser, and P. Dadam, "On enabling integrated process compliance with semantic constraints in process management systems - requirements, challenges, solutions," Information Systems Frontiers, pp. 1-25, June 2009.
    • (2009) Information Systems Frontiers , pp. 1-25
    • Ly, T.1    Rinderle-Ma, S.2    Goser, K.3    Dadam, P.4
  • 34
    • 70449688135 scopus 로고    scopus 로고
    • Comprehensive life cycle support for access rules in information systems: The CEOSIS project
    • July
    • S. Rinderle-Ma and M. Reichert, "Comprehensive life cycle support for access rules in information systems: The CEOSIS project," Enterprise Information Systems, vol. 3, no. 3, pp. 219-251, July 2009.
    • (2009) Enterprise Information Systems , vol.3 , Issue.3 , pp. 219-251
    • Rinderle-Ma, S.1    Reichert, M.2
  • 36
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC - a workflow security model incorporating controlled overriding of constraints
    • December
    • J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC - a workflow security model incorporating controlled overriding of constraints," International Journal of Cooperative Information Systems, vol. 12, no. 4, pp. 455-485, December 2003.
    • (2003) International Journal of Cooperative Information Systems , vol.12 , Issue.4 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3
  • 38
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • September
    • F. Casati, S. Castano, and M. Fugini, "Managing workflow authorization constraints through active database technology," Information Systems Frontiers, vol. 3, no. 3, pp. 319-338, September 2001.
    • (2001) Information Systems Frontiers , vol.3 , Issue.3 , pp. 319-338
    • Casati, F.1    Castano, S.2    Fugini, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.