-
1
-
-
0033650839
-
Injecting rbac to secure a web-based workflow system
-
New York, NY, USA ACM
-
G.-J. Ahn, R. Sandhu, M. Kang, and J. Park. Injecting rbac to secure a web-based workflow system. In Proceedings of the fifth ACM workshop on Role-based access control, RBAC'00, pages 1-10, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the Fifth ACM Workshop on Role-based Access Control, RBAC'00
, pp. 1-10
-
-
Ahn, G.-J.1
Sandhu, R.2
Kang, M.3
Park, J.4
-
2
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferraria, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1):65-104, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferraria, E.2
Atluri, V.3
-
4
-
-
84860855974
-
Exploiting single-user web applications for shared editing: A generic transformation approach
-
New York, NY, USA ACM
-
M. Heinrich, F. Lehmann, T. Springer, and M. Gaedke. Exploiting single-user web applications for shared editing: a generic transformation approach. In Proceedings of the 21st international conference on World Wide Web, WWW'12, pages 1057-1066, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 21st International Conference on World Wide Web, WWW'12
, pp. 1057-1066
-
-
Heinrich, M.1
Lehmann, F.2
Springer, T.3
Gaedke, M.4
-
5
-
-
79960160217
-
An integrated approach for identity and access management in a soa context
-
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, and S. Dustdar. An integrated approach for identity and access management in a soa context. In 16th ACM Symposium on Access Control Models and Technologies, 2011.
-
(2011)
16th ACM Symposium on Access Control Models and Technologies
-
-
Hummer, W.1
Gaubatz, P.2
Strembeck, M.3
Zdun, U.4
Dustdar, S.5
-
6
-
-
35248828504
-
Aspect-oriented programming
-
M. Aksit and S. Matsuoka, editors of Lecture Notes in Computer Science Springer Berlin / Heidelberg 10.1007/BFb0053381
-
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-oriented programming. In M. Aksit and S. Matsuoka, editors, ECOOP'97 Object-Oriented Programming, Volume 1241 of Lecture Notes in Computer Science, pages 220-242. Springer Berlin / Heidelberg, 1997. 10.1007/BFb0053381.
-
(1997)
ECOOP'97 Object-Oriented Programming
, vol.1241
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.-M.6
Irwin, J.7
-
7
-
-
84870642884
-
Role-based access control for information federations in the industrial service sector
-
S. Kunz, S. Evdokimov, B. Fabian, B. Stieger, and M. Strembeck. Role-based access control for information federations in the industrial service sector. In ECIS, 2010.
-
(2010)
ECIS
-
-
Kunz, S.1
Evdokimov, S.2
Fabian, B.3
Stieger, B.4
Strembeck, M.5
-
9
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. Computer, 29(2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
10
-
-
60649098567
-
Enforcing role-based access control policies in web services with uml and ocl
-
Washington, DC IEEE Computer Society
-
K. Sohr, T. Mustafa, X. Bao, and G.-J. Ahn. Enforcing role-based access control policies in web services with uml and ocl. In Proceedings of the 2008 Annual Computer Security Applications Conference, ACSAC'08, pages 257-266, Washington, DC, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference, ACSAC'08
, pp. 257-266
-
-
Sohr, K.1
Mustafa, T.2
Bao, X.3
Ahn, G.-J.4
-
11
-
-
77249095368
-
Scenario-driven role engineering
-
January/February
-
M. Strembeck. Scenario-driven Role Engineering. IEEE Security & Privacy, 8(1) January/February 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.1
-
-
Strembeck, M.1
-
12
-
-
78650098860
-
Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context
-
OTM'10 Berlin, Heidelberg Springer-Verlag
-
M. Strembeck and J. Mendling. Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context. In Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I, OTM'10, pages 204-221, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 2010 International Conference on On the Move to Meaningful Internet Systems
, Issue.PART I
, pp. 204-221
-
-
Strembeck, M.1
Mendling, J.2
-
13
-
-
67649847712
-
-
The Dojo Foundation. Open Cooperative Web Framework. http://opencoweb. org/.
-
The Dojo Foundation
-
-
-
15
-
-
84877969502
-
-
U. Zdun. Frag. http://frag.sf.net/.
-
-
-
Zdun, U.1
|