-
3
-
-
60149108864
-
Essential layers, artifacts, and dependencies of enterprise architecture
-
R. Winter, and R. Fischer Essential layers, artifacts, and dependencies of enterprise architecture J. Enterprise Architect. 3 2006 7 18
-
(2006)
J. Enterprise Architect.
, vol.3
, pp. 7-18
-
-
Winter, R.1
Fischer, R.2
-
5
-
-
0008162190
-
-
Workflow Management Coalition Technical Report Document Number WFMC-TC-1019 Document Status - Issue 1.0, Workflow Management Coalition
-
Workflow Management Coalition, Workflow Security Considerations - White Paper, Technical Report Document Number WFMC-TC-1019 Document Status - Issue 1.0, Workflow Management Coalition, 1998.
-
(1998)
Workflow Security Considerations - White Paper
-
-
-
6
-
-
84866426254
-
A decade of business process management conferences: Personal reflections on a developing discipline
-
A. Barros, A. Gal, E. Kindler, Lecture Notes in Computer Science Springer
-
W.M.P. van der Aalst A decade of business process management conferences: personal reflections on a developing discipline A. Barros, A. Gal, E. Kindler, Proceedings of the 10th International Conference on Business Process Management (BPM) Lecture Notes in Computer Science vol. 7481 2012 Springer 1 16
-
(2012)
Proceedings of the 10th International Conference on Business Process Management (BPM)
, vol.7481
, pp. 1-16
-
-
Van Der Aalst, W.M.P.1
-
7
-
-
27644567603
-
-
Joint Technical Report, Department of Computer Science, Keele University and Empirical Software Engineering, National ICT Australia Ltd.
-
B. Kitchenham, Procedures for Performing Systematic Reviews, Joint Technical Report, Department of Computer Science, Keele University and Empirical Software Engineering, National ICT Australia Ltd., 2004.
-
(2004)
Procedures for Performing Systematic Reviews
-
-
Kitchenham, B.1
-
8
-
-
44649122227
-
-
EBSE Technical Report EBSE-2007-01 Version 2.3, School of Computer Science and Mathematics, Keele University and Department of Computer Science, University of Durham
-
B. Kitchenham, S. Charters, Guidelines for performing Systematic Literature Reviews in Software Engineering, EBSE Technical Report EBSE-2007-01 Version 2.3, School of Computer Science and Mathematics, Keele University and Department of Computer Science, University of Durham, 2007.
-
(2007)
Guidelines for Performing Systematic Literature Reviews in Software Engineering
-
-
Kitchenham, B.1
Charters, S.2
-
10
-
-
85088075417
-
Systematic mapping studies in software engineering
-
British Computer Society Swinton, UK
-
K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson Systematic mapping studies in software engineering Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE), EASE'08 2008 British Computer Society Swinton, UK 68 77
-
(2008)
Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE), EASE'08
, pp. 68-77
-
-
Petersen, K.1
Feldt, R.2
Mujtaba, S.3
Mattsson, M.4
-
11
-
-
84865720227
-
The maturity of maturity model research: A systematic mapping study
-
R. Wendler The maturity of maturity model research: a systematic mapping study Inform. Software Technol. 54 2012 1317 1339
-
(2012)
Inform. Software Technol.
, vol.54
, pp. 1317-1339
-
-
Wendler, R.1
-
12
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
J. Wainer, P. Barthelmess, and A. Kumar W-RBAC - a workflow security model incorporating controlled overriding of constraints Int. J. Cooper. Inform. Syst. 12 2003 455 485
-
(2003)
Int. J. Cooper. Inform. Syst.
, vol.12
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
13
-
-
84867499427
-
Systematic literature studies: Database searches vs.Backward snowballing
-
ACM New York, NY, USA
-
S. Jalali, and C. Wohlin Systematic literature studies: database searches vs. backward snowballing Proceedings of the ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), ESEM '12 2012 ACM New York, NY, USA 29 38
-
(2012)
Proceedings of the ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), ESEM '12
, pp. 29-38
-
-
Jalali, S.1
Wohlin, C.2
-
14
-
-
84876283132
-
Systematic literature reviews in software engineering
-
C. Wohlin, and R. Prikladnicki Systematic literature reviews in software engineering Inform. Software Technol. 55 2013 919 920
-
(2013)
Inform. Software Technol.
, vol.55
, pp. 919-920
-
-
Wohlin, C.1
Prikladnicki, R.2
-
17
-
-
84885174213
-
A systematic review of systematic review process research in software engineering
-
B. Kitchenham, and P. Brereton A systematic review of systematic review process research in software engineering Inform. Software Technol. 55 2013 2049 2075
-
(2013)
Inform. Software Technol.
, vol.55
, pp. 2049-2075
-
-
Kitchenham, B.1
Brereton, P.2
-
18
-
-
78651076564
-
KNIME - The konstanz information miner: Version 2.0 and beyond
-
M.R. Berthold, N. Cebron, F. Dill, T.R. Gabriel, T. Kötter, T. Meinl, P. Ohl, K. Thiel, and B. Wiswedel KNIME - the konstanz information miner: version 2.0 and beyond SIGKDD Explor. Newslett. 11 2009 26 31
-
(2009)
SIGKDD Explor. Newslett.
, vol.11
, pp. 26-31
-
-
Berthold, M.R.1
Cebron, N.2
Dill, F.3
Gabriel, T.R.4
Kötter, T.5
Meinl, T.6
Ohl, P.7
Thiel, K.8
Wiswedel, B.9
-
21
-
-
79953708792
-
Identifying relevant studies in software engineering
-
H. Zhang, M.A. Babar, and P. Tell Identifying relevant studies in software engineering Inform. Software Technol. 53 2011 625 637
-
(2011)
Inform. Software Technol.
, vol.53
, pp. 625-637
-
-
Zhang, H.1
Babar, M.A.2
Tell, P.3
-
23
-
-
84892578593
-
-
OASIS Web Services Business Process Execution Language (WSBPEL) TC, Web Services Business Process Execution Language Version 2.0, OASIS Standard, OASIS, 2007
-
OASIS Web Services Business Process Execution Language (WSBPEL) TC, Web Services Business Process Execution Language Version 2.0, OASIS Standard, OASIS, 2007. < http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.pdf >.
-
-
-
-
24
-
-
33746354903
-
-
Specification 1.0, Active Endpoints Inc., Adobe Systems Inc., BEA Systems Inc., International Business Machines Corporation, Oracle Inc., and SAP AG
-
A. Agrawal, M. Amend, M. Das, M. Ford, C. Keller, M. Kloppmann, D. König, F. Leymann, R. Müller, G. Pfau, et al., WS-BPEL Extension for People (BPEL4People), Specification 1.0, Active Endpoints Inc., Adobe Systems Inc., BEA Systems Inc., International Business Machines Corporation, Oracle Inc., and SAP AG, 2007. < http://public.dhe.ibm.com/software/dw/specs/ws- bpel4people/BPEL4People-v1.pdf >.
-
(2007)
WS-BPEL Extension for People (BPEL4People)
-
-
Agrawal, A.1
Amend, M.2
Das, M.3
Ford, M.4
Keller, C.5
Kloppmann, M.6
König, D.7
Leymann, F.8
Müller, R.9
Pfau, G.10
-
26
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
R. Baskerville Information systems security design methods: implications for information systems development ACM Comput. Surv. 25 1993 375 414
-
(1993)
ACM Comput. Surv.
, vol.25
, pp. 375-414
-
-
Baskerville, R.1
-
29
-
-
79952372864
-
On evolving organizational models without losing control on authorization constraints in web service orchestrations
-
IEEE Computer Society Los Alamitos, CA, USA
-
S. Rinderle-Ma, and M. Leitner On evolving organizational models without losing control on authorization constraints in web service orchestrations Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing (CEC) 2010 IEEE Computer Society Los Alamitos, CA, USA 128 135
-
(2010)
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing (CEC)
, pp. 128-135
-
-
Rinderle-Ma, S.1
Leitner, M.2
-
30
-
-
33747466065
-
A security interpretation of the workflow reference model
-
R.A. Botha, J.H. Eloff, A security interpretation of the workflow reference model, in: Proceedings of the Information Security - From Small Systems to Management of Secure Infrastructures, vol. 2, 1998, pp. 43-51.
-
(1998)
Proceedings of the Information Security - From Small Systems to Management of Secure Infrastructures
, vol.2
, pp. 43-51
-
-
Botha, R.A.1
Eloff, J.H.2
-
32
-
-
15744374605
-
Multilevel security and information flow in petri net workflows
-
Dallas, TX
-
K. Knorr, Multilevel security and information flow in petri net workflows, in: Proceedings of the 9th International Conference on Telecommunication Systems - Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems, Dallas, TX, 2001, pp. 9-20.
-
(2001)
Proceedings of the 9th International Conference on Telecommunication Systems - Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems
, pp. 9-20
-
-
Knorr, K.1
-
36
-
-
84871247750
-
Deploying access control in distributed workflow
-
Australian Computer Society, Inc. Wollongong, NSW, Australia
-
S. Ayed, N. Cuppens-Boulahia, and F. Cuppens Deploying access control in distributed workflow Proceedings of the 6th Australasian Conference on Information Security vol. 81 2008 Australian Computer Society, Inc. Wollongong, NSW, Australia 9 17
-
(2008)
Proceedings of the 6th Australasian Conference on Information Security
, vol.81
, pp. 9-17
-
-
Ayed, S.1
Cuppens-Boulahia, N.2
Cuppens, F.3
-
38
-
-
64249086031
-
Security analysis of electronic business processes
-
S. Röhrig, and K. Knorr Security analysis of electronic business processes Electr. Commerce Res. 4 2004 59 81
-
(2004)
Electr. Commerce Res.
, vol.4
, pp. 59-81
-
-
Röhrig, S.1
Knorr, K.2
-
40
-
-
84892579955
-
The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system
-
Muldersdrift, South Africa published electronically
-
K. Venter, M.S. Olivier, The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system, in: Proceedings of the 2nd Annual Conference on Information for Security for South-Africa (ISSA), Muldersdrift, South Africa, 2002, pp. 1-12 (published electronically).
-
(2002)
Proceedings of the 2nd Annual Conference on Information for Security for South-Africa (ISSA)
, pp. 1-12
-
-
Venter, K.1
Olivier, M.S.2
-
41
-
-
12844263500
-
Modeling and analyzing of workflow authorization management
-
Z. Yi, Z. Yong, and W. Weinong Modeling and analyzing of workflow authorization management J. Network Syst. Manage. 12 2004 507 535
-
(2004)
J. Network Syst. Manage.
, vol.12
, pp. 507-535
-
-
Yi, Z.1
Yong, Z.2
Weinong, W.3
-
42
-
-
0036161253
-
Authorization and access control of application data in workflow systems
-
S. Wu, A. Sheth, J. Miller, and Z. Luo Authorization and access control of application data in workflow systems J. Intell. Inform. Syst. 18 2002 71 94
-
(2002)
J. Intell. Inform. Syst.
, vol.18
, pp. 71-94
-
-
Wu, S.1
Sheth, A.2
Miller, J.3
Luo, Z.4
-
43
-
-
77956459875
-
MobilegSET - Secure business workflows for mobile-grid clients
-
J. Mangler, C. Witzany, O. Jorns, E. Schikuta, H. Wanek, and I. Ul Haq MobilegSET - secure business workflows for mobile-grid clients Concurrency Comput. Pract. Experience 22 2010 2036 2051
-
(2010)
Concurrency Comput. Pract. Experience
, vol.22
, pp. 2036-2051
-
-
Mangler, J.1
Witzany, C.2
Jorns, O.3
Schikuta, E.4
Wanek, H.5
Ul Haq, I.6
-
44
-
-
34247151648
-
A BPMN extension for the modeling of security requirements in business processes
-
A. Rodríguez, E. Fernández-Medina, and M. Piattini A BPMN extension for the modeling of security requirements in business processes IEICE Trans. Informa. Syst. E90-D 2007 745 752
-
(2007)
IEICE Trans. Informa. Syst.
, vol.90 E -D
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
45
-
-
70349683196
-
Security requirements specification in service-oriented business process management
-
M. Menzel, I. Thomas, C. Meinel, Security requirements specification in service-oriented business process management, in: Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES), 2009, pp. 41-48.
-
(2009)
Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES)
, pp. 41-48
-
-
Menzel, M.1
Thomas, I.2
Meinel, C.3
-
49
-
-
13544276885
-
Process mining and security: Detecting anomalous process executions and checking process conformance
-
W.M.P. van der Aalst, and A.K.A. de Medeiros Process mining and security: detecting anomalous process executions and checking process conformance Electr. Notes Theor. Comput. Sci. 121 2005 3 21
-
(2005)
Electr. Notes Theor. Comput. Sci.
, vol.121
, pp. 3-21
-
-
Van Der Aalst, W.M.P.1
De Medeiros, A.K.A.2
-
52
-
-
33646676768
-
Balancing flexibility and security in adaptive process management systems
-
Springer
-
B. Weber, M. Reichert, W. Wild, and S. Rinderle Balancing flexibility and security in adaptive process management systems Proceedings of the 13th International Conference on Cooperative Information Systems (CoopIS), Lecture Notes in Computer Science vol. 3760 2005 Springer 59 76
-
(2005)
Proceedings of the 13th International Conference on Cooperative Information Systems (CoopIS), Lecture Notes in Computer Science
, vol.3760
, pp. 59-76
-
-
Weber, B.1
Reichert, M.2
Wild, W.3
Rinderle, S.4
-
54
-
-
49049104639
-
Defining secure business processes with respect to multiple objectives
-
IEEE Computer Society Los Alamitos, CA, USA
-
T. Neubauer, and J. Heurix Defining secure business processes with respect to multiple objectives Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES) 2008 IEEE Computer Society Los Alamitos, CA, USA 187 194
-
(2008)
Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES)
, pp. 187-194
-
-
Neubauer, T.1
Heurix, J.2
-
57
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
A. Zuccato Holistic security requirement engineering for electronic commerce Comput. Security 23 2004 63 76
-
(2004)
Comput. Security
, vol.23
, pp. 63-76
-
-
Zuccato, A.1
-
58
-
-
33746190788
-
Towards secure electronic workflows
-
A. Atzeni, A. Lioy, Lecture Notes in Computer Science Springer
-
S. Fritsch, V. Karatsiolis, M. Lippert, A. Wiesmaier, and J. Buchmann Towards secure electronic workflows A. Atzeni, A. Lioy, Proceedings of the 3rd European Public Key Infrastructure Workshop: Theory and Practice (EuroPKI) Lecture Notes in Computer Science vol. 4043 2006 Springer 154 168
-
(2006)
Proceedings of the 3rd European Public Key Infrastructure Workshop: Theory and Practice (EuroPKI)
, vol.4043
, pp. 154-168
-
-
Fritsch, S.1
Karatsiolis, V.2
Lippert, M.3
Wiesmaier, A.4
Buchmann, J.5
-
59
-
-
33644553339
-
Security in business process engineering
-
M. Backes, B. Pfitzmann, M. Waidner, Security in business process engineering, in: Proceedings of the 1st International Conference on Business Process Management (BPM), 2003, pp. 168-183.
-
(2003)
Proceedings of the 1st International Conference on Business Process Management (BPM)
, pp. 168-183
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
62
-
-
57349111770
-
Task-based entailment constraints for basic workflow patterns
-
ACM New York, NY, USA
-
C. Wolter, A. Schaad, and C. Meinel Task-based entailment constraints for basic workflow patterns Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT '08 2008 ACM New York, NY, USA 51 60
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, SACMAT '08
, pp. 51-60
-
-
Wolter, C.1
Schaad, A.2
Meinel, C.3
-
64
-
-
0242625201
-
Model driven security for process-oriented systems
-
ACM New York, NY, USA
-
D. Basin, J. Doser, and T. Lodderstedt Model driven security for process-oriented systems Proceedings of the 8h ACM Symposium on Access Control Models and Technologies (SACMAT), SACMAT '03 2003 ACM New York, NY, USA 100 109
-
(2003)
Proceedings of the 8h ACM Symposium on Access Control Models and Technologies (SACMAT), SACMAT '03
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
66
-
-
33749063417
-
Modelling inter-organizational workflow security in a peer-to-peer environment
-
M. Hafner, M. Breu, R. Breu, A. Nowak, Modelling inter-organizational workflow security in a peer-to-peer environment, in: Proceedings of the IEEE International Conference on Web Services (ICWS), 2005, pp. 533-540.
-
(2005)
Proceedings of the IEEE International Conference on Web Services (ICWS)
, pp. 533-540
-
-
Hafner, M.1
Breu, M.2
Breu, R.3
Nowak, A.4
-
69
-
-
8444249279
-
Workflow access control from a business perspective
-
D. Domingos, A. Rito-Silva, P. Veiga, Workflow access control from a business perspective, in: Proceedings of the 6th International Conference on Enterprise Information Systems (ICEIS), vol. 3, 2004, p. 18-25.
-
(2004)
Proceedings of the 6th International Conference on Enterprise Information Systems (ICEIS)
, vol.3
, pp. 18-25
-
-
Domingos, D.1
Rito-Silva, A.2
Veiga, P.3
-
70
-
-
33847228387
-
Specifying selected security features of inter-organizational workflows
-
Control and Automation (CIMCA) IEEE Computer Society Los Alamitos, CA, USA
-
B. Mikolajczak, and S. Joshi Specifying selected security features of inter-organizational workflows Proceedings of the International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA) vol. 2 2005 IEEE Computer Society Los Alamitos, CA, USA 958 963
-
(2005)
Proceedings of the International Conference on Computational Intelligence for Modelling
, vol.2
, pp. 958-963
-
-
Mikolajczak, B.1
Joshi, S.2
-
71
-
-
84892566641
-
Abbildung von zugriffskontrollaussagen in geschäftsprozessmodellen
-
H. Klarl, C. Wolff, C. Emig, Abbildung von zugriffskontrollaussagen in geschäftsprozessmodellen, in: Modellierung 2008 - Workshop Verhaltensmodellierung: Best Practices und neue Erkenntnisse, 2008, p. 14.
-
(2008)
Modellierung 2008 - Workshop Verhaltensmodellierung: Best Practices und Neue Erkenntnisse
, pp. 14
-
-
Klarl, H.1
Wolff, C.2
Emig, C.3
-
74
-
-
33749367621
-
Security requirement analysis of business processes
-
P. Herrmann, and G. Herrmann Security requirement analysis of business processes Electronic Commerce Research 6 2006 305 335
-
(2006)
Electronic Commerce Research
, vol.6
, pp. 305-335
-
-
Herrmann, P.1
Herrmann, G.2
-
76
-
-
79951826265
-
Secure business processes in service-oriented architectures - A requirements analysis
-
IEEE Computer Society Los Alamitos, CA, USA
-
J. Müller, J. Mülle, S.v. Stackelberg, and K. Böhm Secure business processes in service-oriented architectures - a requirements analysis Proceedings of the 10th IEEE European Conference on Web Services (ECOWS) 2010 IEEE Computer Society Los Alamitos, CA, USA 35 42
-
(2010)
Proceedings of the 10th IEEE European Conference on Web Services (ECOWS)
, pp. 35-42
-
-
Müller, J.1
Mülle, J.2
Stackelberg, S.V.3
Böhm, K.4
-
77
-
-
58449093195
-
Secure workflow development from early requirements analysis
-
IEEE Computer Society Los Alamitos, CA, USA
-
M. Séguran, C. Hébert, and G. Frankova Secure workflow development from early requirements analysis Proceedings of the 6th European Conference on Web Services (ECOWS) 2008 IEEE Computer Society Los Alamitos, CA, USA 125 134
-
(2008)
Proceedings of the 6th European Conference on Web Services (ECOWS)
, pp. 125-134
-
-
Séguran, M.1
Hébert, C.2
Frankova, G.3
-
78
-
-
25144499038
-
Workflow resource patterns: Identification, representation and tool support
-
O. Pastor, J. Falcão e Cunha, Lecture Notes in Computer Science Springer
-
N. Russell, W.M.P. van der Aalst, A. ter Hofstede, and D. Edmond Workflow resource patterns: identification, representation and tool support O. Pastor, J. Falcão e Cunha, Proceedings of the 17th International Conference on Advanced Information Systems Engineering (CAiSE) Lecture Notes in Computer Science vol. 3520 2005 Springer 11 42
-
(2005)
Proceedings of the 17th International Conference on Advanced Information Systems Engineering (CAiSE)
, vol.3520
, pp. 11-42
-
-
Russell, N.1
Van Der Aalst, W.M.P.2
Ter Hofstede, A.3
Edmond, D.4
-
80
-
-
84992227458
-
Proposed NIST standard for role-based acces control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli Proposed NIST standard for role-based acces control ACM Trans. Inform. Syst. Security 4 2001 224 274
-
(2001)
ACM Trans. Inform. Syst. Security
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
81
-
-
0031382313
-
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems
-
ACM Fairfax, Virginia, United States
-
E. Bertino, E. Ferrari, and V. Atluri A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems Proceedings of the 2nd ACM Workshop on Role-based Access Control 1997 ACM Fairfax, Virginia, United States 1 12
-
(1997)
Proceedings of the 2nd ACM Workshop on Role-based Access Control
, pp. 1-12
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
82
-
-
0038825675
-
Task-role-based access control model
-
S. Oh, and S. Park Task-role-based access control model Information Systems 28 2003 533 562
-
(2003)
Information Systems
, vol.28
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
83
-
-
30644466528
-
Secure role-based workflow models
-
S. Kandala, R. Sandhu, Secure role-based workflow models, in: Proceedings of the 15th IFIP TC11/WG11.3 Annual Working Conference on Database and Application Security, vol. XV, 2002, pp. 45-58.
-
(2002)
Proceedings of the 15th IFIP TC11/WG11.3 Annual Working Conference on Database and Application Security
, vol.15
, pp. 45-58
-
-
Kandala, S.1
Sandhu, R.2
-
89
-
-
0031355379
-
Enforcing mandatory and discretionary security in workflow management systems
-
V. Atluri, and W.-K. Huang Enforcing mandatory and discretionary security in workflow management systems J. Comput. Security 5 1997 303 339
-
(1997)
J. Comput. Security
, vol.5
, pp. 303-339
-
-
Atluri, V.1
Huang, W.-K.2
-
90
-
-
0033887763
-
A semantic based execution model for multilevel secure workflows
-
V. Atluri, W.-k. Huang, and E. Bertino A semantic based execution model for multilevel secure workflows J. Comput. Security 8 2000 3 41
-
(2000)
J. Comput. Security
, vol.8
, pp. 3-41
-
-
Atluri, V.1
Huang, W.-K.2
Bertino, E.3
-
91
-
-
84958973327
-
A multilevel secure workflow management system
-
M. Kang, J. Froscher, A. Sheth, K. Kochut, J. Miller, A multilevel secure workflow management system, in: Proceedings of the 11th International Conference on Advanced Information Systems Engineering (CAISE), 1999, pp. 271-285.
-
(1999)
Proceedings of the 11th International Conference on Advanced Information Systems Engineering (CAISE)
, pp. 271-285
-
-
Kang, M.1
Froscher, J.2
Sheth, A.3
Kochut, K.4
Miller, J.5
-
92
-
-
20844432808
-
Chinese wall security for decentralized workflow management systems
-
V. Atluri, S.A. Chun, and P. Mazzoleni Chinese wall security for decentralized workflow management systems J. Comput. Security 12 2004 799 840
-
(2004)
J. Comput. Security
, vol.12
, pp. 799-840
-
-
Atluri, V.1
Chun, S.A.2
Mazzoleni, P.3
-
93
-
-
33751436350
-
DW-RBAC: A formal security model of delegation and revocation in workflow systems
-
J. Wainer, A. Kumar, and P. Barthelmess DW-RBAC: a formal security model of delegation and revocation in workflow systems Inform. Syst. 32 2007 365 384
-
(2007)
Inform. Syst.
, vol.32
, pp. 365-384
-
-
Wainer, J.1
Kumar, A.2
Barthelmess, P.3
-
94
-
-
55849098600
-
A secure task delegation model for workflows
-
IEEE Computer Society Los Alamitos, CA, USA
-
K. Gaaloul, A. Schaad, U. Flegel, and F. Charoy A secure task delegation model for workflows International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE) 2008 IEEE Computer Society Los Alamitos, CA, USA 10 15
-
(2008)
International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE)
, pp. 10-15
-
-
Gaaloul, K.1
Schaad, A.2
Flegel, U.3
Charoy, F.4
-
98
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
ACM New York, NY, USA
-
M.H. Kang, J.S. Park, and J.N. Froscher Access control mechanisms for inter-organizational workflow Proceedings of the sixth ACM Symposium on Access Control Models and Technologies (SACMAT) 2001 ACM New York, NY, USA 66 74
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 66-74
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
99
-
-
77952407814
-
Organization based access control
-
IEEE Computer Society Los Alamitos, CA, USA
-
A. Abou El Kalam, S. Benferhat, A. Miége, R.E. Baida, F. Cuppens, C. Saurel, P. Balbiani, Y. Deswarte, and G. Trouessin Organization based access control Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY) 2003 IEEE Computer Society Los Alamitos, CA, USA 120 131
-
(2003)
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 120-131
-
-
Abou El Kalam, A.1
Benferhat, S.2
Miége, A.3
Baida, R.E.4
Cuppens, F.5
Saurel, C.6
Balbiani, P.7
Deswarte, Y.8
Trouessin, G.9
-
100
-
-
50049095080
-
Managing access and flow control requirements in distributed workflows
-
IEEE Computer Society Los Alamitos, CA, USA
-
S. Ayed, N. Cuppens-Boulahia, and F. Cuppens Managing access and flow control requirements in distributed workflows Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA) 2008 IEEE Computer Society Los Alamitos, CA, USA 702 710
-
(2008)
Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA)
, pp. 702-710
-
-
Ayed, S.1
Cuppens-Boulahia, N.2
Cuppens, F.3
-
101
-
-
38349100724
-
Constraint based role based access control in the SECTET-framework a model-driven approach
-
M. Alam, M. Hafner, and R. Breu Constraint based role based access control in the SECTET-framework a model-driven approach J. Comput. Security 16 2008 223 260
-
(2008)
J. Comput. Security
, vol.16
, pp. 223-260
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
102
-
-
70849090093
-
A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes
-
A. Schaad, K. Sohr, and M. Drouineaud A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes J. Inform. Assurance Security 2 2007
-
(2007)
J. Inform. Assurance Security
, vol.2
-
-
Schaad, A.1
Sohr, K.2
Drouineaud, M.3
-
103
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri The specification and enforcement of authorization constraints in workflow management systems ACM Trans. Inform. Syst. Security 2 1999 65 104
-
(1999)
ACM Trans. Inform. Syst. Security
, vol.2
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
104
-
-
78650098860
-
Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context
-
Lecture Notes in Computer Science Springer
-
M. Strembeck, and J. Mendling Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context Proceedings of the 18th International Conference on Cooperative Information Systems (CoopIS) Lecture Notes in Computer Science vol. 6426 2010 Springer 204 221
-
(2010)
Proceedings of the 18th International Conference on Cooperative Information Systems (CoopIS)
, vol.6426
, pp. 204-221
-
-
Strembeck, M.1
Mendling, J.2
-
105
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
R.A. Botha, and J.H.P. Eloff Separation of duties for access control enforcement in workflow environments IBM Syst. J. 40 2001 666 682
-
(2001)
IBM Syst. J.
, vol.40
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
106
-
-
0035594917
-
Managing workflow authorization constraints through active database technology
-
F. Casati, S. Castano, and M.G. Fugini Managing workflow authorization constraints through active database technology Inform. Syst. Front. 3 2001 319 338
-
(2001)
Inform. Syst. Front.
, vol.3
, pp. 319-338
-
-
Casati, F.1
Castano, S.2
Fugini, M.G.3
-
107
-
-
78651384017
-
Satisfiability and resiliency in workflow authorization systems
-
Q. Wang, and N. Li Satisfiability and resiliency in workflow authorization systems ACM Trans. Inform. Syst. Security (TISSEC) 13 2010 40:1 40:35
-
(2010)
ACM Trans. Inform. Syst. Security (TISSEC)
, vol.13
, pp. 401-4035
-
-
Wang, Q.1
Li, N.2
-
109
-
-
75649086163
-
Specification, verification and explanation of violation for data aware compliance rules
-
Lecture Notes in Computer Science Springer
-
A. Awad, M. Weidlich, and M. Weske Specification, verification and explanation of violation for data aware compliance rules Service-Oriented Computing Lecture Notes in Computer Science vol. 5900 2009 Springer 500 515
-
(2009)
Service-Oriented Computing
, vol.5900
, pp. 500-515
-
-
Awad, A.1
Weidlich, M.2
Weske, M.3
-
110
-
-
84874274461
-
Integration of process constraints from heterogeneous sources in process-aware information systems
-
M. Nüttgens, O. Thomas, B. Weber (Eds.)
-
S. Rinderle-Ma, J. Mangler, Integration of process constraints from heterogeneous sources in process-aware information systems, in: M. Nüttgens, O. Thomas, B. Weber (Eds.), Enterprise Modelling and Information Systems Architectures (EMISA 2011), Lecture Notes in Informatics (LNI), GI, vol. P-190, 2011, pp. 51-64.
-
(2011)
Enterprise Modelling and Information Systems Architectures (EMISA 2011), Lecture Notes in Informatics (LNI), GI
, vol.P-190
, pp. 51-64
-
-
Rinderle-Ma, S.1
Mangler, J.2
-
111
-
-
78649924571
-
On enabling data-aware compliance checking of business process models
-
J. Parsons, M. Saeki, P. Shoval, C. Woo, Y. Wand, Lecture Notes in Computer Science Springer
-
D. Knuplesch, L.T. Ly, S. Rinderle-Ma, H. Pfeifer, and P. Dadam On enabling data-aware compliance checking of business process models J. Parsons, M. Saeki, P. Shoval, C. Woo, Y. Wand, Conceptual Modeling - ER 2010 Lecture Notes in Computer Science vol. 6412 2010 Springer 332 346
-
(2010)
Conceptual Modeling - ER 2010
, vol.6412
, pp. 332-346
-
-
Knuplesch, D.1
Ly, L.T.2
Rinderle-Ma, S.3
Pfeifer, H.4
Dadam, P.5
-
112
-
-
33748053971
-
Inter-instance authorization constraints for secure workflow management
-
ACM New York, NY, USA
-
J. Warner, and V. Atluri Inter-instance authorization constraints for secure workflow management Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT), SACMAT '06 2006 ACM New York, NY, USA 190 199
-
(2006)
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT), SACMAT '06
, pp. 190-199
-
-
Warner, J.1
Atluri, V.2
-
113
-
-
84869439450
-
Definition and enactment of instance-spanning process constraints
-
X.S. Wang, I. Cruz, A. Delis, G. Huang, Lecture Notes in Computer Science Springer
-
M. Leitner, J. Mangler, and S. Rinderle-Ma Definition and enactment of instance-spanning process constraints X.S. Wang, I. Cruz, A. Delis, G. Huang, Proceedings of the 13th International Conference on Web Information Systems Engineering (WISE) Lecture Notes in Computer Science 2012 Springer 652 658
-
(2012)
Proceedings of the 13th International Conference on Web Information Systems Engineering (WISE)
, pp. 652-658
-
-
Leitner, M.1
Mangler, J.2
Rinderle-Ma, S.3
-
115
-
-
84861459429
-
On enabling integrated process compliance with semantic constraints in process management systems - Requirements, challenges, solutions
-
L.T. Ly, S. Rinderle-Ma, K. Göser, and P. Dadam On enabling integrated process compliance with semantic constraints in process management systems - requirements, challenges, solutions Inform. Syst. Front. 14 2012 195 219
-
(2012)
Inform. Syst. Front.
, vol.14
, pp. 195-219
-
-
Ly, L.T.1
Rinderle-Ma, S.2
Göser, K.3
Dadam, P.4
-
116
-
-
14544287677
-
Specification and validation of process constraints for flexible workflows
-
S.W. Sadiq, M.E. Orlowska, and W. Sadiq Specification and validation of process constraints for flexible workflows Inform. Syst. 30 2005 349 378
-
(2005)
Inform. Syst.
, vol.30
, pp. 349-378
-
-
Sadiq, S.W.1
Orlowska, M.E.2
Sadiq, W.3
-
118
-
-
36049040272
-
Integration and verification of semantic constraints in adaptive process management systems
-
L.T. Ly, S. Rinderle, and P. Dadam Integration and verification of semantic constraints in adaptive process management systems Data Knowl. Eng. 64 2008 3 23
-
(2008)
Data Knowl. Eng.
, vol.64
, pp. 3-23
-
-
Ly, L.T.1
Rinderle, S.2
Dadam, P.3
-
123
-
-
81255207847
-
Detecting and resolving conflicts of mutual-exclusion and binding constraints in a business process context
-
Lecture Notes in Computer Science (LNCS) Springer Crete, Greece
-
S. Schefer, M. Strembeck, J. Mendling, and A. Baumgrass Detecting and resolving conflicts of mutual-exclusion and binding constraints in a business process context Proceedings of the 19th International Conference on Cooperative Information Systems (CoopIS) Lecture Notes in Computer Science (LNCS) vol. 7044 2011 Springer Crete, Greece 329 346
-
(2011)
Proceedings of the 19th International Conference on Cooperative Information Systems (CoopIS)
, vol.7044
, pp. 329-346
-
-
Schefer, S.1
Strembeck, M.2
Mendling, J.3
Baumgrass, A.4
-
124
-
-
63249084376
-
Verification of workflow processes under multilevel security considerations
-
K. Barkaoui, B. Ayed, H. Boucheneb, A. Hicheur, Verification of workflow processes under multilevel security considerations, in: Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS), 2008, pp. 77-84.
-
(2008)
Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS)
, pp. 77-84
-
-
Barkaoui, K.1
Ayed, B.2
Boucheneb, H.3
Hicheur, A.4
-
125
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
SACMAT '06 ACM New York, NY, USA
-
A. Schaad, V. Lotz, and K. Sohr A model-checking approach to analysing organisational controls in a loan origination process Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies SACMAT '06 2006 ACM New York, NY, USA 139 149
-
(2006)
Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
126
-
-
70849107955
-
Verifying the interplay of authorization policies and workflow in service-oriented architectures
-
IEEE Computer Society Los Alamitos, CA, USA
-
M. Barletta, S. Ranise, and L. Viganó Verifying the interplay of authorization policies and workflow in service-oriented architectures Proceedings of the IEEE International Conference on Computational Science and Engineering (CSE) vol. 3 2009 IEEE Computer Society Los Alamitos, CA, USA 289 296
-
(2009)
Proceedings of the IEEE International Conference on Computational Science and Engineering (CSE)
, vol.3
, pp. 289-296
-
-
Barletta, M.1
Ranise, S.2
Viganó, L.3
-
128
-
-
33749635457
-
A declarative approach for flexible business processes management
-
J. Eder, S. Dustdar, Lecture Notes in Computer Science Springer
-
M. Pesic, and W.M.P. van der Aalst A declarative approach for flexible business processes management J. Eder, S. Dustdar, Proceedings of the Business Process Management Workshops Lecture Notes in Computer Science vol. 4103 2006 Springer 169 180
-
(2006)
Proceedings of the Business Process Management Workshops
, vol.4103
, pp. 169-180
-
-
Pesic, M.1
Van Der Aalst, W.M.P.2
-
129
-
-
84892588060
-
Expressing and verifying business contracts with abductive
-
G. Boella, L.v.d. Torre, H. Verhagen (Eds.) Schloss Dagstuhl, Germany, Dagstuhl, Germany
-
M. Alberti, F. Chesani, M. Gavanelli, E. Lamma, P. Mello, M. Montali, P. Torroni, Expressing and verifying business contracts with abductive, in: G. Boella, L.v.d. Torre, H. Verhagen (Eds.), Normative Multi-agent Systems, Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum f++r Informatik (IBFI), Schloss Dagstuhl, Germany, Dagstuhl, Germany, 2007, pp. 1-29.
-
(2007)
Normative Multi-agent Systems, Dagstuhl Seminar Proceedings, Internationales Begegnungs- Und Forschungszentrum F++r Informatik (IBFI)
, pp. 1-29
-
-
Alberti, M.1
Chesani, F.2
Gavanelli, M.3
Lamma, E.4
Mello, P.5
Montali, M.6
Torroni, P.7
-
130
-
-
84891781134
-
-
DEIS DEIS-LIA-002-11, Universita degli Studi di Bologna
-
M. Montali, F.M. Maggi, F. Chesani, P. Mello, W.M.P. van der Aalst, Monitoring Business Constraints with the Event Calculus, DEIS DEIS-LIA-002-11, Universita degli Studi di Bologna, 2011.
-
(2011)
Monitoring Business Constraints with the Event Calculus
-
-
Montali, M.1
Maggi, F.M.2
Chesani, F.3
Mello, P.4
Aalst Der Van, P.W.M.5
-
131
-
-
77953985972
-
Visualization of compliance violation in business process models
-
Lecture Notes in Business Information Processing Springer
-
A. Awad, and M. Weske Visualization of compliance violation in business process models Proceedings of the Business Process Management Workshops Lecture Notes in Business Information Processing vol. 43 2009 Springer 182 193
-
(2009)
Proceedings of the Business Process Management Workshops
, vol.43
, pp. 182-193
-
-
Awad, A.1
Weske, M.2
-
132
-
-
80052802014
-
Event-based monitoring of process execution violations
-
Springer
-
M. Weidlich, H. Ziekow, J. Mendling, O. G++nther, M. Weske, and N. Desai Event-based monitoring of process execution violations Proceedings of the 9th International Conference on Business Process Management (BPM) vol. 6896 2011 Springer 182 198
-
(2011)
Proceedings of the 9th International Conference on Business Process Management (BPM)
, vol.6896
, pp. 182-198
-
-
Weidlich, M.1
Ziekow, H.2
Mendling, J.3
G++nther, O.4
Weske, M.5
Desai, N.6
-
133
-
-
72849120008
-
Using stateful activities to facilitate monitoring and repair in workflow choreographies
-
J. Eder, J. Mangler, E. Mussi, B. Pernici, Using stateful activities to facilitate monitoring and repair in workflow choreographies, in: Proceedings of the International Workshop on Self Healing Web Services, Congress on Services - I, 2009, pp. 219-226.
-
(2009)
Proceedings of the International Workshop on Self Healing Web Services, Congress on Services - I
, pp. 219-226
-
-
Eder, J.1
Mangler, J.2
Mussi, E.3
Pernici, B.4
-
134
-
-
55349121225
-
Anomaly detection algorithms in business process logs
-
volume AIDSS, Barcelona, Spain
-
F. Bezerra, J. Wainer, Anomaly detection algorithms in business process logs, in: Proceedings of the 10th International Conference on Enterprise Information Systems (ICEIS), volume AIDSS, Barcelona, Spain, 2008, p. 11-18.
-
(2008)
Proceedings of the 10th International Conference on Enterprise Information Systems (ICEIS)
, pp. 11-18
-
-
Bezerra, F.1
Wainer, J.2
-
135
-
-
67249114883
-
Anomaly detection using process mining
-
Lecture Notes in Business Information Processing Springer
-
F. Bezerra, J. Wainer, and W.M.P. van der Aalst Anomaly detection using process mining Proceedings of the 10th Workshop on Business Process Modeling, Development, and Support (BPMDS) Lecture Notes in Business Information Processing vol. 29 2009 Springer 149 161
-
(2009)
Proceedings of the 10th Workshop on Business Process Modeling, Development, and Support (BPMDS)
, vol.29
, pp. 149-161
-
-
Bezerra, F.1
Wainer, J.2
Van Der Aalst, W.M.P.3
-
136
-
-
43149089736
-
Conformance checking of service behavior
-
W.M.P. van der Aalst, M. Dumas, C. Ouyang, A. Rozinat, and E. Verbeek Conformance checking of service behavior ACM Trans. Internet Technol. 8 2008 1 30
-
(2008)
ACM Trans. Internet Technol.
, vol.8
, pp. 1-30
-
-
Van Der Aalst, W.M.P.1
Dumas, M.2
Ouyang, C.3
Rozinat, A.4
Verbeek, E.5
-
137
-
-
84856573172
-
Conformance checking of RBAC policies in process-aware information systems
-
Lecture Notes in Business Information Processing Springer
-
A. Baumgrass, T. Baier, J. Mendling, and M. Strembeck Conformance checking of RBAC policies in process-aware information systems Proceedings of the Business Process Management Workshops Lecture Notes in Business Information Processing vol. 100 2011 Springer 435 446
-
(2011)
Proceedings of the Business Process Management Workshops
, vol.100
, pp. 435-446
-
-
Baumgrass, A.1
Baier, T.2
Mendling, J.3
Strembeck, M.4
-
139
-
-
84863590198
-
On the exploitation of process mining for security audits: The conformance checking case
-
ACM New York, NY, USA
-
R. Accorsi, and T. Stocker On the exploitation of process mining for security audits: the conformance checking case Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC), SAC '12 2012 ACM New York, NY, USA 1709 1716
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC), SAC '12
, pp. 1709-1716
-
-
Accorsi, R.1
Stocker, T.2
-
140
-
-
56049101373
-
Towards comprehensive support for organizational mining
-
M. Song, and W.M.P. van der Aalst Towards comprehensive support for organizational mining Decis. Support Syst. 46 2008 300 317
-
(2008)
Decis. Support Syst.
, vol.46
, pp. 300-317
-
-
Song, M.1
Van Der Aalst, W.M.P.2
-
141
-
-
33745134088
-
Mining staff assignment rules from event-based data
-
Lecture Notes in Computer Science Springer
-
L. Ly, S. Rinderle, P. Dadam, and M. Reichert Mining staff assignment rules from event-based data Business Process Management Workshops Lecture Notes in Computer Science vol. 3812 2005 Springer 177 190
-
(2005)
Business Process Management Workshops
, vol.3812
, pp. 177-190
-
-
Ly, L.1
Rinderle, S.2
Dadam, P.3
Reichert, M.4
-
142
-
-
84873176389
-
A case study on the suitability of process mining to produce current-state RBAC model
-
Lecture Notes in Business Information Processing Springer Tallinn, Estonia
-
M. Leitner, A. Baumgrass, S. Schefer-Wenzl, S. Rinderle-Ma, and M. Strembeck A case study on the suitability of process mining to produce current-state RBAC model Proceedings of the Business Process Management Workshops Lecture Notes in Business Information Processing vol. 132 2012 Springer Tallinn, Estonia 719 724
-
(2012)
Proceedings of the Business Process Management Workshops
, vol.132
, pp. 719-724
-
-
Leitner, M.1
Baumgrass, A.2
Schefer-Wenzl, S.3
Rinderle-Ma, S.4
Strembeck, M.5
-
144
-
-
58149086705
-
Business provenance - A technology to increase traceability of end-to-end operations
-
Lecture Notes in Computer Science Springer
-
F. Curbera, Y. Doganata, A. Martens, N. Mukhi, and A. Slominski Business provenance - a technology to increase traceability of end-to-end operations Proceedings of the 16th International Conference on Cooperative Information Systems (CoopIS) Lecture Notes in Computer Science vol. 5331 2008 Springer 100 119
-
(2008)
Proceedings of the 16th International Conference on Cooperative Information Systems (CoopIS)
, vol.5331
, pp. 100-119
-
-
Curbera, F.1
Doganata, Y.2
Martens, A.3
Mukhi, N.4
Slominski, A.5
-
145
-
-
70349338903
-
Effect of using automated auditing tools on detecting compliance failures in unmanaged processes
-
Lecture Notes in Computer Science Springer
-
Y. Doganata, and F. Curbera Effect of using automated auditing tools on detecting compliance failures in unmanaged processes Proceedings of the 7th International Conference on Business Process Management Lecture Notes in Computer Science vol. 5701 2009 Springer 310 326
-
(2009)
Proceedings of the 7th International Conference on Business Process Management
, vol.5701
, pp. 310-326
-
-
Doganata, Y.1
Curbera, F.2
-
149
-
-
0034292030
-
Exception handling in workflow management systems
-
C. Hagen, and G. Alonso Exception handling in workflow management systems IEEE Trans. Software Eng. 26 2000 943 958
-
(2000)
IEEE Trans. Software Eng.
, vol.26
, pp. 943-958
-
-
Hagen, C.1
Alonso, G.2
-
151
-
-
33646672440
-
A service-oriented workflow language for robust interacting applications
-
Lecture Notes in Computer Science Springer
-
S. Nepal, A. Fekete, P. Greenfield, J. Jang, D. Kuo, and T. Shi A service-oriented workflow language for robust interacting applications Proceedings of the 13th International Conference on Cooperative Information Systems (CoopIS) Lecture Notes in Computer Science vol. 3760 2005 Springer 40 58
-
(2005)
Proceedings of the 13th International Conference on Cooperative Information Systems (CoopIS)
, vol.3760
, pp. 40-58
-
-
Nepal, S.1
Fekete, A.2
Greenfield, P.3
Jang, J.4
Kuo, D.5
Shi, T.6
-
152
-
-
21944450970
-
A scheme to specify and implement ad-hoc recovery in workflow systems
-
H.-J. Schek, G. Alonso, F. Saltor, I. Ramos, Lecture Notes in Computer Science Springer
-
J. Tang, and S.-Y. Hwang A scheme to specify and implement ad-hoc recovery in workflow systems H.-J. Schek, G. Alonso, F. Saltor, I. Ramos, Proceedings of the 6th International Conference on Extending Database Technology (EDBT) Lecture Notes in Computer Science vol. 1377 1998 Springer 484 498
-
(1998)
Proceedings of the 6th International Conference on Extending Database Technology (EDBT)
, vol.1377
, pp. 484-498
-
-
Tang, J.1
Hwang, S.-Y.2
-
155
-
-
38949217978
-
Dynamic regeneration of workflow specification with access control requirements in MANET
-
C. Fung, P. Hung, W. Kearns, S. Uczekaj, Dynamic regeneration of workflow specification with access control requirements in MANET, in: Proceedings of the International Conference on Web Services (ICWS), 2006, pp. 761-769.
-
(2006)
Proceedings of the International Conference on Web Services (ICWS)
, pp. 761-769
-
-
Fung, C.1
Hung, P.2
Kearns, W.3
Uczekaj, S.4
-
156
-
-
55949102930
-
The implementation and evaluation of a recovery system for workflows
-
M. Yu, P. Liu, and W. Zang The implementation and evaluation of a recovery system for workflows J. Network Comput. Appl. 32 2009 158 183
-
(2009)
J. Network Comput. Appl.
, vol.32
, pp. 158-183
-
-
Yu, M.1
Liu, P.2
Zang, W.3
-
157
-
-
26844535740
-
Recovering from malicious attacks in workflow systems
-
K.V. Andersen, J. Debenham, R. Wagner, Lecture Notes in Computer Science Springer
-
Y. Zhu, T. Xin, and I. Ray Recovering from malicious attacks in workflow systems K.V. Andersen, J. Debenham, R. Wagner, Proceedings of the 16th International Conference on Database and Expert Systems Applications (DEXA) Lecture Notes in Computer Science vol. 3588 2005 Springer 14 23
-
(2005)
Proceedings of the 16th International Conference on Database and Expert Systems Applications (DEXA)
, vol.3588
, pp. 14-23
-
-
Zhu, Y.1
Xin, T.2
Ray, I.3
-
158
-
-
33846384543
-
Ensuring task dependencies during workflow recovery
-
F. Galindo, M. Takizawa, R. TraunMüller, Lecture Notes in Computer Science Springer
-
I. Ray, T. Xin, and Y. Zhu Ensuring task dependencies during workflow recovery F. Galindo, M. Takizawa, R. TraunMüller, Proceedings of the 15th International Conference on Database and Expert Systems Applications (DEXA) Lecture Notes in Computer Science vol. 3180 2004 Springer 24 33
-
(2004)
Proceedings of the 15th International Conference on Database and Expert Systems Applications (DEXA)
, vol.3180
, pp. 24-33
-
-
Ray, I.1
Xin, T.2
Zhu, Y.3
-
161
-
-
46849087573
-
User tasks and access control over web services
-
IEEE Computer Society Los Alamitos, CA, USA
-
J. Thomas, F. Paci, E. Bertino, and P. Eugster User tasks and access control over web services Proceedings of the IEEE International Conference on Web Services (ICWS) 2007 IEEE Computer Society Los Alamitos, CA, USA 60 69
-
(2007)
Proceedings of the IEEE International Conference on Web Services (ICWS)
, pp. 60-69
-
-
Thomas, J.1
Paci, F.2
Bertino, E.3
Eugster, P.4
-
162
-
-
38949086163
-
Access control and authorization constraints for WS-BPEL
-
IEEE Computer Society Los Alamitos, CA, USA
-
E. Bertino, J. Crampton, and F. Paci Access control and authorization constraints for WS-BPEL Proceedings of the 13th IEEE International Conference on Web Services (ICWS) 2006 IEEE Computer Society Los Alamitos, CA, USA 275 284
-
(2006)
Proceedings of the 13th IEEE International Conference on Web Services (ICWS)
, pp. 275-284
-
-
Bertino, E.1
Crampton, J.2
Paci, F.3
-
163
-
-
3543075807
-
An access control framework for business processes for web services
-
ACM New York, NY, USA
-
H. Koshutanski, and F. Massacci An access control framework for business processes for web services Proceedings of the 2003 ACM workshop on XML security, XMLSEC '03 2003 ACM New York, NY, USA 15 24
-
(2003)
Proceedings of the 2003 ACM Workshop on XML Security, XMLSEC '03
, pp. 15-24
-
-
Koshutanski, H.1
Massacci, F.2
-
164
-
-
84902459113
-
Interactive access control for web services
-
Y. Deswarte, F. Cuppens, S. Jajodia, L. Wang, IFIP International Federation for Information Processing Springer US
-
H. Koshutanski, and F. Massacci Interactive access control for web services Y. Deswarte, F. Cuppens, S. Jajodia, L. Wang, Security and protection in information processing systems IFIP International Federation for Information Processing vol. 147 2004 Springer US 150 166
-
(2004)
Security and Protection in Information Processing Systems
, vol.147
, pp. 150-166
-
-
Koshutanski, H.1
Massacci, F.2
-
165
-
-
38949158021
-
Security conscious web service composition
-
IEEE Computer Society Los Alamitos, CA, USA
-
B. Carminati, E. Ferrari, and P.C.K. Hung Security conscious web service composition Proceedings of the IEEE International Conference on Web Services (ICWS) 2006 IEEE Computer Society Los Alamitos, CA, USA 489 496
-
(2006)
Proceedings of the IEEE International Conference on Web Services (ICWS)
, pp. 489-496
-
-
Carminati, B.1
Ferrari, E.2
Hung, P.C.K.3
-
167
-
-
33744965347
-
Trust-based secure workflow path construction
-
B. Benatallah, F. Casati, P. Traverso, Lecture Notes in Computer Science Springer
-
M. Altunay, D. Brown, G. Byrd, and R. Dean Trust-based secure workflow path construction B. Benatallah, F. Casati, P. Traverso, Proceedings of the 3rd International Conference on Service-Oriented Computing (ICSOC) Lecture Notes in Computer Science vol. 3826 2005 Springer 382 395
-
(2005)
Proceedings of the 3rd International Conference on Service-Oriented Computing (ICSOC)
, vol.3826
, pp. 382-395
-
-
Altunay, M.1
Brown, D.2
Byrd, G.3
Dean, R.4
-
169
-
-
33750453781
-
Sectet: An extensible framework for the realization of secure inter-organizational workflows
-
M. Hafner, R. Breu, B. Agreiter, and A. Nowak Sectet: an extensible framework for the realization of secure inter-organizational workflows Internet Res. 16 2006 491 506
-
(2006)
Internet Res.
, vol.16
, pp. 491-506
-
-
Hafner, M.1
Breu, R.2
Agreiter, B.3
Nowak, A.4
-
170
-
-
73149108190
-
SeAAS-A reference architecture for security services in SOA
-
M. Hafner, M. Memon, and R. Breu SeAAS-A reference architecture for security services in SOA J. Universal Comput. Sci. 15 2009 2916 2936
-
(2009)
J. Universal Comput. Sci.
, vol.15
, pp. 2916-2936
-
-
Hafner, M.1
Memon, M.2
Breu, R.3
-
171
-
-
81455142699
-
Vulnerability analysis in SOA-Based business processes
-
L. Lowis, and R. Accorsi Vulnerability analysis in SOA-Based business processes IEEE Trans. Serv. Comput. 4 2011 230 242
-
(2011)
IEEE Trans. Serv. Comput.
, vol.4
, pp. 230-242
-
-
Lowis, L.1
Accorsi, R.2
-
172
-
-
47749117614
-
SOA and web services: New technologies, new standards - New attacks
-
IEEE Computer Society
-
M. Jensen, N. Gruschka, R. Herkenhöner, and N. Luttenberger SOA and web services: new technologies, new standards - new attacks Proceedings of the 5th IEEE European Conference on Web Services (ECOWS) 2007 IEEE Computer Society 35 44
-
(2007)
Proceedings of the 5th IEEE European Conference on Web Services (ECOWS)
, pp. 35-44
-
-
Jensen, M.1
Gruschka, N.2
Herkenhöner, R.3
Luttenberger, N.4
-
174
-
-
46849093205
-
A stateful web service firewall for BPEL
-
Salt Lake City, UT, USA
-
N. Gruschka, M. Jensen, N. Luttenberger, A stateful web service firewall for BPEL, in: Proceedings of the IEEE International Conference on Web Services (ICWS), Salt Lake City, UT, USA, 2007, pp. 142-149.
-
(2007)
Proceedings of the IEEE International Conference on Web Services (ICWS)
, pp. 142-149
-
-
Gruschka, N.1
Jensen, M.2
Luttenberger, N.3
-
176
-
-
2442581391
-
Tucupi: A flexible workflow system based on overridable constraints
-
ACM New York, NY, USA
-
J. Wainer, F. Bezerra, and P. Barthelmess Tucupi: a flexible workflow system based on overridable constraints Proceedings of the 2004 ACM Symposium on Applied Computing, SAC '04 2004 ACM New York, NY, USA 498 502
-
(2004)
Proceedings of the 2004 ACM Symposium on Applied Computing, SAC '04
, pp. 498-502
-
-
Wainer, J.1
Bezerra, F.2
Barthelmess, P.3
-
177
-
-
47849093816
-
Napoleon: A recipe for workflow
-
IEEE Computer Society Los Alamitos, CA, USA
-
C. Payne, D. Thomsen, J. Bogle, and R. O'Brien Napoleon: a recipe for workflow Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC) 1999 IEEE Computer Society Los Alamitos, CA, USA 134 142
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC)
, pp. 134-142
-
-
Payne, C.1
Thomsen, D.2
Bogle, J.3
O'Brien, R.4
-
178
-
-
33745668435
-
Flexible workflow incorporated with RBAC
-
W. Shen, K.-M. Chao, Z. Lin, J.-P. Barthŕs, A. James, Lecture Notes in Computer Science Springer
-
Y. Sun, X. Meng, S. Liu, and P. Pan Flexible workflow incorporated with RBAC W. Shen, K.-M. Chao, Z. Lin, J.-P. Barthŕs, A. James, Proceedings of the 9th International Conference on Computer Supported Cooperative Work in Design II Lecture Notes in Computer Science vol. 3865 2006 Springer 525 534
-
(2006)
Proceedings of the 9th International Conference on Computer Supported Cooperative Work in Design II
, vol.3865
, pp. 525-534
-
-
Sun, Y.1
Meng, X.2
Liu, S.3
Pan, P.4
-
179
-
-
51849146665
-
Consent-based workflows for healthcare management
-
IEEE Computer Society Los Alamitos, CA, USA
-
G. Russello, C. Dong, and N. Dulay Consent-based workflows for healthcare management Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY) 2008 IEEE Computer Society Los Alamitos, CA, USA 153 161
-
(2008)
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 153-161
-
-
Russello, G.1
Dong, C.2
Dulay, N.3
-
180
-
-
50249126670
-
A workflow-based access control framework for e-health applications
-
IEEE Computer Society Los Alamitos, CA, USA
-
G. Russello, C. Dong, and N. Dulay A workflow-based access control framework for e-health applications Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops 2008 IEEE Computer Society Los Alamitos, CA, USA 111 120
-
(2008)
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops
, pp. 111-120
-
-
Russello, G.1
Dong, C.2
Dulay, N.3
-
181
-
-
84892574455
-
Secure disconnected agent interaction for electronic commerce activities using CapBasED-AMS
-
P.C.K. Hung, and K. Karlapalem Secure disconnected agent interaction for electronic commerce activities using CapBasED-AMS Information Technology and Management 3 2002 329 351
-
(2002)
Information Technology and Management
, vol.3
, pp. 329-351
-
-
Hung, P.C.K.1
Karlapalem, K.2
-
182
-
-
0036887432
-
Wrappers - A mechanism to support state-based authorisation in web applications
-
M. Olivier, and E. Gudes Wrappers - a mechanism to support state-based authorisation in web applications Data Knowl. Eng. 43 2002 281 292
-
(2002)
Data Knowl. Eng.
, vol.43
, pp. 281-292
-
-
Olivier, M.1
Gudes, E.2
-
183
-
-
0036779153
-
AutoWF: A secure web workflow system using autonomous objects
-
E. Gudes, and A. Tubman AutoWF: a secure web workflow system using autonomous objects Data Knowl. Eng. 43 2002 1 27
-
(2002)
Data Knowl. Eng.
, vol.43
, pp. 1-27
-
-
Gudes, E.1
Tubman, A.2
-
184
-
-
25844517955
-
Theoretical and practical issues in evaluating the quality of conceptual models: Current state and future directions
-
D.L. Moody Theoretical and practical issues in evaluating the quality of conceptual models: current state and future directions Data Knowl. Eng. 55 2005 243 276
-
(2005)
Data Knowl. Eng.
, vol.55
, pp. 243-276
-
-
Moody, D.L.1
-
185
-
-
77953902441
-
-
Technical Report, National Institute of Standards & Technology, Gaithersburg, MD, United States
-
K.A. Scarfone, M.P. Souppaya, A. Cody, A.D. Orebaugh, SP 800-115. Technical Guide to Information Security Testing and Assessment, Technical Report, National Institute of Standards & Technology, Gaithersburg, MD, United States, 2008.
-
(2008)
Technical Guide to Information Security Testing and Assessment
-
-
Scarfone, K.A.1
Souppaya, M.P.2
Cody, A.3
Orebaugh, A.D.4
-
187
-
-
84878587195
-
Corrective enforcement: A new paradigm of security policy enforcement by monitors
-
R. Khoury, and N. Tawbi Corrective enforcement: a new paradigm of security policy enforcement by monitors ACM Trans. Inform. Syst. Security (TISSEC) 15 2012 10:1 10:27
-
(2012)
ACM Trans. Inform. Syst. Security (TISSEC)
, vol.15
, pp. 101-1027
-
-
Khoury, R.1
Tawbi, N.2
-
188
-
-
23944463649
-
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems
-
ACM New York, NY, USA
-
G.L. Orgill, G.W. Romney, M.G. Bailey, and P.M. Orgill The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems Proceedings of the 5th Conference on Information Technology Education, CITC5 '04 2004 ACM New York, NY, USA 177 181
-
(2004)
Proceedings of the 5th Conference on Information Technology Education, CITC5 '04
, pp. 177-181
-
-
Orgill, G.L.1
Romney, G.W.2
Bailey, M.G.3
Orgill, P.M.4
-
190
-
-
84892405502
-
An analysis and evaluation of security aspects in the business process model and notation
-
IEEE Regensburg, Germany
-
M. Leitner, M. Miller, and S. Rinderle-Ma An analysis and evaluation of security aspects in the business process model and notation Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES) 2013 IEEE Regensburg, Germany 262 267
-
(2013)
Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES)
, pp. 262-267
-
-
Leitner, M.1
Miller, M.2
Rinderle-Ma, S.3
-
191
-
-
85006049205
-
An experimental study on the design and modeling of security concepts in business processes
-
Springer Riga, Latvia
-
M. Leitner, S. Schefer-Wenzl, S. Rinderle-Ma, and M. Strembeck An experimental study on the design and modeling of security concepts in business processes Proceedings of the 6th IFIP WG 8.1 Working Conference on the Practice of Enterprice Modeling (PoEM) 2013 Springer Riga, Latvia 236 250
-
(2013)
Proceedings of the 6th IFIP WG 8.1 Working Conference on the Practice of Enterprice Modeling (PoEM)
, pp. 236-250
-
-
Leitner, M.1
Schefer-Wenzl, S.2
Rinderle-Ma, S.3
Strembeck, M.4
-
192
-
-
80955144182
-
Roles in information security - A survey and classification of the research area
-
L. Fuchs, G. Pernul, and R. Sandhu Roles in information security - a survey and classification of the research area Comput. Security 30 2011 748 769
-
(2011)
Comput. Security
, vol.30
, pp. 748-769
-
-
Fuchs, L.1
Pernul, G.2
Sandhu, R.3
-
194
-
-
47849117407
-
Change patterns and change support features - Enhancing flexibility in process-aware information systems
-
B. Weber, M. Reichert, and S. Rinderle-Ma Change patterns and change support features - enhancing flexibility in process-aware information systems Data Knowl. Eng. 66 2008 438 466
-
(2008)
Data Knowl. Eng.
, vol.66
, pp. 438-466
-
-
Weber, B.1
Reichert, M.2
Rinderle-Ma, S.3
|