메뉴 건너뛰기




Volumn 47 LNBIP, Issue , 2010, Pages 207-217

Auditing workflow executions against dataflow policies

Author keywords

Audit; Dataflow; Policy; Workflow and business process

Indexed keywords

ALGORITHMS; INFORMATION SYSTEMS; MANAGEMENT; MESSAGE PASSING; PUBLIC POLICY;

EID: 84876359591     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-12814-1_18     Document Type: Conference Paper
Times cited : (18)

References (21)
  • 1
    • 44649131263 scopus 로고    scopus 로고
    • Automated privacy audits to complement the notion of control for identity management
    • de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.), Springer, Heidelberg
    • Accorsi, R.: Automated Privacy Audits to Complement the Notion of Control for Identity Management. In: de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.) Policies and Research in Identity Management, IFIP, vol. 261. Springer, Heidelberg (2008)
    • (2008) Policies and Research in Identity Management, IFIP , vol.261
    • Accorsi, R.1
  • 2
    • 71249116454 scopus 로고    scopus 로고
    • Safe-keeping digital evidence with secure logging protocols: State of the art and challenges
    • September 2009
    • Accorsi, R.: Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. In: Proceedings IMF 2009, September 2009, pp. 94-110 (2009)
    • (2009) Proceedings IMF 2009 , pp. 94-110
    • Accorsi, R.1
  • 3
    • 84883001875 scopus 로고    scopus 로고
    • Detective information flow analysis for business processes
    • Accorsi, R., Wonnemann, C.: Detective information flow analysis for business processes. In: BPSC, pp. 223-224 (2009)
    • (2009) BPSC , pp. 223-224
    • Accorsi, R.1    Wonnemann, C.2
  • 5
    • 70849107955 scopus 로고    scopus 로고
    • Verifying the interplay of authorization policies and workflow in service-oriented architectures
    • Barletta, M., Ranise, S., Viganò, L.: Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. In: CSE (3), pp. 289-296 (2009)
    • (2009) CSE , vol.3 , pp. 289-296
    • Barletta, M.1    Ranise, S.2    Viganò, L.3
  • 12
    • 78650760999 scopus 로고    scopus 로고
    • Automating privacy compliance with EXPDT
    • Kähmer, M., Gilliot, M., Müller, G.: Automating Privacy Compliance with ExPDT. In: CEC/EEE, pp. 87-94 (2008)
    • (2008) CEC/EEE , pp. 87-94
    • Kähmer, M.1    Gilliot, M.2    Müller, G.3
  • 13
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson, B.W.: A note on the confinement problem. Communications of the ACM 16(10), 613-615 (1973)
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 16
    • 77951442815 scopus 로고    scopus 로고
    • Secure usage control for transparency in financial markets
    • Müller, G., Accorsi, R., Höhn, S., Sackmann, S.: Secure usage control for transparency in financial markets. Informatik Spektrum 33(1), 3-13 (2010)
    • (2010) Informatik Spektrum , vol.33 , Issue.1 , pp. 3-13
    • Müller, G.1    Accorsi, R.2    Höhn, S.3    Sackmann, S.4
  • 18
    • 33847060397 scopus 로고    scopus 로고
    • Formulating the data- flow perspective for business process management
    • Sun, S.X., Zhao, J.L., Nunamaker, J.F., Sheng, O.R.L.: Formulating the Data- Flow Perspective for Business Process Management. Information Systems Research 17(4), 374-391 (2006)
    • (2006) Information Systems Research , vol.17 , Issue.4 , pp. 374-391
    • Sun, S.X.1    Zhao, J.L.2    Nunamaker, J.F.3    Sheng, O.R.L.4
  • 21
    • 70449659976 scopus 로고    scopus 로고
    • On information flow forensics in business application scenarios
    • IEEE Computer Society, Los Alamitos
    • Wonnemann, C., Accorsi, R., Müller, G.: On Information Flow Forensics in Business Application Scenarios. In: Proceedings Compsac 2009, vol. 2, pp. 324-328. IEEE Computer Society, Los Alamitos (2009)
    • (2009) Proceedings Compsac 2009 , vol.2 , pp. 324-328
    • Wonnemann, C.1    Accorsi, R.2    Müller, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.