메뉴 건너뛰기




Volumn 56, Issue 3, 2014, Pages 273-293

A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions

Author keywords

Business Process Management; Business process security; Process Aware Information Systems; Security; Systematic literature review; Workflow security

Indexed keywords

ACCESS CONTROL; ADMINISTRATIVE DATA PROCESSING; ENTERPRISE RESOURCE MANAGEMENT; INFORMATION SYSTEMS; INFORMATION USE; SECURITY SYSTEMS;

EID: 84892614680     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2013.12.004     Document Type: Review
Times cited : (64)

References (194)
  • 3
    • 60149108864 scopus 로고    scopus 로고
    • Essential layers, artifacts, and dependencies of enterprise architecture
    • R. Winter, and R. Fischer Essential layers, artifacts, and dependencies of enterprise architecture J. Enterprise Architect. 3 2006 7 18
    • (2006) J. Enterprise Architect. , vol.3 , pp. 7-18
    • Winter, R.1    Fischer, R.2
  • 5
    • 0008162190 scopus 로고    scopus 로고
    • Workflow Management Coalition Technical Report Document Number WFMC-TC-1019 Document Status - Issue 1.0, Workflow Management Coalition
    • Workflow Management Coalition, Workflow Security Considerations - White Paper, Technical Report Document Number WFMC-TC-1019 Document Status - Issue 1.0, Workflow Management Coalition, 1998.
    • (1998) Workflow Security Considerations - White Paper
  • 6
    • 84866426254 scopus 로고    scopus 로고
    • A decade of business process management conferences: Personal reflections on a developing discipline
    • A. Barros, A. Gal, E. Kindler, Lecture Notes in Computer Science Springer
    • W.M.P. van der Aalst A decade of business process management conferences: personal reflections on a developing discipline A. Barros, A. Gal, E. Kindler, Proceedings of the 10th International Conference on Business Process Management (BPM) Lecture Notes in Computer Science vol. 7481 2012 Springer 1 16
    • (2012) Proceedings of the 10th International Conference on Business Process Management (BPM) , vol.7481 , pp. 1-16
    • Van Der Aalst, W.M.P.1
  • 7
    • 27644567603 scopus 로고    scopus 로고
    • Joint Technical Report, Department of Computer Science, Keele University and Empirical Software Engineering, National ICT Australia Ltd.
    • B. Kitchenham, Procedures for Performing Systematic Reviews, Joint Technical Report, Department of Computer Science, Keele University and Empirical Software Engineering, National ICT Australia Ltd., 2004.
    • (2004) Procedures for Performing Systematic Reviews
    • Kitchenham, B.1
  • 8
    • 44649122227 scopus 로고    scopus 로고
    • EBSE Technical Report EBSE-2007-01 Version 2.3, School of Computer Science and Mathematics, Keele University and Department of Computer Science, University of Durham
    • B. Kitchenham, S. Charters, Guidelines for performing Systematic Literature Reviews in Software Engineering, EBSE Technical Report EBSE-2007-01 Version 2.3, School of Computer Science and Mathematics, Keele University and Department of Computer Science, University of Durham, 2007.
    • (2007) Guidelines for Performing Systematic Literature Reviews in Software Engineering
    • Kitchenham, B.1    Charters, S.2
  • 11
    • 84865720227 scopus 로고    scopus 로고
    • The maturity of maturity model research: A systematic mapping study
    • R. Wendler The maturity of maturity model research: a systematic mapping study Inform. Software Technol. 54 2012 1317 1339
    • (2012) Inform. Software Technol. , vol.54 , pp. 1317-1339
    • Wendler, R.1
  • 12
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC - A workflow security model incorporating controlled overriding of constraints
    • J. Wainer, P. Barthelmess, and A. Kumar W-RBAC - a workflow security model incorporating controlled overriding of constraints Int. J. Cooper. Inform. Syst. 12 2003 455 485
    • (2003) Int. J. Cooper. Inform. Syst. , vol.12 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3
  • 14
    • 84876283132 scopus 로고    scopus 로고
    • Systematic literature reviews in software engineering
    • C. Wohlin, and R. Prikladnicki Systematic literature reviews in software engineering Inform. Software Technol. 55 2013 919 920
    • (2013) Inform. Software Technol. , vol.55 , pp. 919-920
    • Wohlin, C.1    Prikladnicki, R.2
  • 17
    • 84885174213 scopus 로고    scopus 로고
    • A systematic review of systematic review process research in software engineering
    • B. Kitchenham, and P. Brereton A systematic review of systematic review process research in software engineering Inform. Software Technol. 55 2013 2049 2075
    • (2013) Inform. Software Technol. , vol.55 , pp. 2049-2075
    • Kitchenham, B.1    Brereton, P.2
  • 21
    • 79953708792 scopus 로고    scopus 로고
    • Identifying relevant studies in software engineering
    • H. Zhang, M.A. Babar, and P. Tell Identifying relevant studies in software engineering Inform. Software Technol. 53 2011 625 637
    • (2011) Inform. Software Technol. , vol.53 , pp. 625-637
    • Zhang, H.1    Babar, M.A.2    Tell, P.3
  • 23
    • 84892578593 scopus 로고    scopus 로고
    • OASIS Web Services Business Process Execution Language (WSBPEL) TC, Web Services Business Process Execution Language Version 2.0, OASIS Standard, OASIS, 2007
    • OASIS Web Services Business Process Execution Language (WSBPEL) TC, Web Services Business Process Execution Language Version 2.0, OASIS Standard, OASIS, 2007. < http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.pdf >.
  • 24
    • 33746354903 scopus 로고    scopus 로고
    • Specification 1.0, Active Endpoints Inc., Adobe Systems Inc., BEA Systems Inc., International Business Machines Corporation, Oracle Inc., and SAP AG
    • A. Agrawal, M. Amend, M. Das, M. Ford, C. Keller, M. Kloppmann, D. König, F. Leymann, R. Müller, G. Pfau, et al., WS-BPEL Extension for People (BPEL4People), Specification 1.0, Active Endpoints Inc., Adobe Systems Inc., BEA Systems Inc., International Business Machines Corporation, Oracle Inc., and SAP AG, 2007. < http://public.dhe.ibm.com/software/dw/specs/ws- bpel4people/BPEL4People-v1.pdf >.
    • (2007) WS-BPEL Extension for People (BPEL4People)
    • Agrawal, A.1    Amend, M.2    Das, M.3    Ford, M.4    Keller, C.5    Kloppmann, M.6    König, D.7    Leymann, F.8    Müller, R.9    Pfau, G.10
  • 26
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • R. Baskerville Information systems security design methods: implications for information systems development ACM Comput. Surv. 25 1993 375 414
    • (1993) ACM Comput. Surv. , vol.25 , pp. 375-414
    • Baskerville, R.1
  • 29
    • 79952372864 scopus 로고    scopus 로고
    • On evolving organizational models without losing control on authorization constraints in web service orchestrations
    • IEEE Computer Society Los Alamitos, CA, USA
    • S. Rinderle-Ma, and M. Leitner On evolving organizational models without losing control on authorization constraints in web service orchestrations Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing (CEC) 2010 IEEE Computer Society Los Alamitos, CA, USA 128 135
    • (2010) Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing (CEC) , pp. 128-135
    • Rinderle-Ma, S.1    Leitner, M.2
  • 38
    • 64249086031 scopus 로고    scopus 로고
    • Security analysis of electronic business processes
    • S. Röhrig, and K. Knorr Security analysis of electronic business processes Electr. Commerce Res. 4 2004 59 81
    • (2004) Electr. Commerce Res. , vol.4 , pp. 59-81
    • Röhrig, S.1    Knorr, K.2
  • 39
    • 0033329699 scopus 로고    scopus 로고
    • Modelling, specifying and implementing workflow security in cyberspace
    • E. Gudes, M.S. Olivier, and R.P.v.d. Riet Modelling, specifying and implementing workflow security in cyberspace J. Comput. Secur. 7 1999 287 315
    • (1999) J. Comput. Secur. , vol.7 , pp. 287-315
    • Gudes, E.1    Olivier, M.S.2    Riet Modelling, R.P.V.D.3
  • 40
    • 84892579955 scopus 로고    scopus 로고
    • The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system
    • Muldersdrift, South Africa published electronically
    • K. Venter, M.S. Olivier, The delegation authorization model: A model for the dynamic delegation of authorization rights in a secure workflow management system, in: Proceedings of the 2nd Annual Conference on Information for Security for South-Africa (ISSA), Muldersdrift, South Africa, 2002, pp. 1-12 (published electronically).
    • (2002) Proceedings of the 2nd Annual Conference on Information for Security for South-Africa (ISSA) , pp. 1-12
    • Venter, K.1    Olivier, M.S.2
  • 41
    • 12844263500 scopus 로고    scopus 로고
    • Modeling and analyzing of workflow authorization management
    • Z. Yi, Z. Yong, and W. Weinong Modeling and analyzing of workflow authorization management J. Network Syst. Manage. 12 2004 507 535
    • (2004) J. Network Syst. Manage. , vol.12 , pp. 507-535
    • Yi, Z.1    Yong, Z.2    Weinong, W.3
  • 42
    • 0036161253 scopus 로고    scopus 로고
    • Authorization and access control of application data in workflow systems
    • S. Wu, A. Sheth, J. Miller, and Z. Luo Authorization and access control of application data in workflow systems J. Intell. Inform. Syst. 18 2002 71 94
    • (2002) J. Intell. Inform. Syst. , vol.18 , pp. 71-94
    • Wu, S.1    Sheth, A.2    Miller, J.3    Luo, Z.4
  • 44
    • 34247151648 scopus 로고    scopus 로고
    • A BPMN extension for the modeling of security requirements in business processes
    • A. Rodríguez, E. Fernández-Medina, and M. Piattini A BPMN extension for the modeling of security requirements in business processes IEICE Trans. Informa. Syst. E90-D 2007 745 752
    • (2007) IEICE Trans. Informa. Syst. , vol.90 E -D , pp. 745-752
    • Rodríguez, A.1    Fernández-Medina, E.2    Piattini, M.3
  • 49
    • 13544276885 scopus 로고    scopus 로고
    • Process mining and security: Detecting anomalous process executions and checking process conformance
    • W.M.P. van der Aalst, and A.K.A. de Medeiros Process mining and security: detecting anomalous process executions and checking process conformance Electr. Notes Theor. Comput. Sci. 121 2005 3 21
    • (2005) Electr. Notes Theor. Comput. Sci. , vol.121 , pp. 3-21
    • Van Der Aalst, W.M.P.1    De Medeiros, A.K.A.2
  • 50
  • 57
    • 1242263785 scopus 로고    scopus 로고
    • Holistic security requirement engineering for electronic commerce
    • A. Zuccato Holistic security requirement engineering for electronic commerce Comput. Security 23 2004 63 76
    • (2004) Comput. Security , vol.23 , pp. 63-76
    • Zuccato, A.1
  • 70
    • 33847228387 scopus 로고    scopus 로고
    • Specifying selected security features of inter-organizational workflows
    • Control and Automation (CIMCA) IEEE Computer Society Los Alamitos, CA, USA
    • B. Mikolajczak, and S. Joshi Specifying selected security features of inter-organizational workflows Proceedings of the International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA) vol. 2 2005 IEEE Computer Society Los Alamitos, CA, USA 958 963
    • (2005) Proceedings of the International Conference on Computational Intelligence for Modelling , vol.2 , pp. 958-963
    • Mikolajczak, B.1    Joshi, S.2
  • 74
    • 33749367621 scopus 로고    scopus 로고
    • Security requirement analysis of business processes
    • P. Herrmann, and G. Herrmann Security requirement analysis of business processes Electronic Commerce Research 6 2006 305 335
    • (2006) Electronic Commerce Research , vol.6 , pp. 305-335
    • Herrmann, P.1    Herrmann, G.2
  • 81
    • 0031382313 scopus 로고    scopus 로고
    • A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems
    • ACM Fairfax, Virginia, United States
    • E. Bertino, E. Ferrari, and V. Atluri A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems Proceedings of the 2nd ACM Workshop on Role-based Access Control 1997 ACM Fairfax, Virginia, United States 1 12
    • (1997) Proceedings of the 2nd ACM Workshop on Role-based Access Control , pp. 1-12
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 82
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • S. Oh, and S. Park Task-role-based access control model Information Systems 28 2003 533 562
    • (2003) Information Systems , vol.28 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 89
    • 0031355379 scopus 로고    scopus 로고
    • Enforcing mandatory and discretionary security in workflow management systems
    • V. Atluri, and W.-K. Huang Enforcing mandatory and discretionary security in workflow management systems J. Comput. Security 5 1997 303 339
    • (1997) J. Comput. Security , vol.5 , pp. 303-339
    • Atluri, V.1    Huang, W.-K.2
  • 90
    • 0033887763 scopus 로고    scopus 로고
    • A semantic based execution model for multilevel secure workflows
    • V. Atluri, W.-k. Huang, and E. Bertino A semantic based execution model for multilevel secure workflows J. Comput. Security 8 2000 3 41
    • (2000) J. Comput. Security , vol.8 , pp. 3-41
    • Atluri, V.1    Huang, W.-K.2    Bertino, E.3
  • 92
    • 20844432808 scopus 로고    scopus 로고
    • Chinese wall security for decentralized workflow management systems
    • V. Atluri, S.A. Chun, and P. Mazzoleni Chinese wall security for decentralized workflow management systems J. Comput. Security 12 2004 799 840
    • (2004) J. Comput. Security , vol.12 , pp. 799-840
    • Atluri, V.1    Chun, S.A.2    Mazzoleni, P.3
  • 93
    • 33751436350 scopus 로고    scopus 로고
    • DW-RBAC: A formal security model of delegation and revocation in workflow systems
    • J. Wainer, A. Kumar, and P. Barthelmess DW-RBAC: a formal security model of delegation and revocation in workflow systems Inform. Syst. 32 2007 365 384
    • (2007) Inform. Syst. , vol.32 , pp. 365-384
    • Wainer, J.1    Kumar, A.2    Barthelmess, P.3
  • 101
    • 38349100724 scopus 로고    scopus 로고
    • Constraint based role based access control in the SECTET-framework a model-driven approach
    • M. Alam, M. Hafner, and R. Breu Constraint based role based access control in the SECTET-framework a model-driven approach J. Comput. Security 16 2008 223 260
    • (2008) J. Comput. Security , vol.16 , pp. 223-260
    • Alam, M.1    Hafner, M.2    Breu, R.3
  • 102
    • 70849090093 scopus 로고    scopus 로고
    • A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes
    • A. Schaad, K. Sohr, and M. Drouineaud A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes J. Inform. Assurance Security 2 2007
    • (2007) J. Inform. Assurance Security , vol.2
    • Schaad, A.1    Sohr, K.2    Drouineaud, M.3
  • 103
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri The specification and enforcement of authorization constraints in workflow management systems ACM Trans. Inform. Syst. Security 2 1999 65 104
    • (1999) ACM Trans. Inform. Syst. Security , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 104
    • 78650098860 scopus 로고    scopus 로고
    • Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context
    • Lecture Notes in Computer Science Springer
    • M. Strembeck, and J. Mendling Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context Proceedings of the 18th International Conference on Cooperative Information Systems (CoopIS) Lecture Notes in Computer Science vol. 6426 2010 Springer 204 221
    • (2010) Proceedings of the 18th International Conference on Cooperative Information Systems (CoopIS) , vol.6426 , pp. 204-221
    • Strembeck, M.1    Mendling, J.2
  • 105
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • R.A. Botha, and J.H.P. Eloff Separation of duties for access control enforcement in workflow environments IBM Syst. J. 40 2001 666 682
    • (2001) IBM Syst. J. , vol.40 , pp. 666-682
    • Botha, R.A.1    Eloff, J.H.P.2
  • 106
    • 0035594917 scopus 로고    scopus 로고
    • Managing workflow authorization constraints through active database technology
    • F. Casati, S. Castano, and M.G. Fugini Managing workflow authorization constraints through active database technology Inform. Syst. Front. 3 2001 319 338
    • (2001) Inform. Syst. Front. , vol.3 , pp. 319-338
    • Casati, F.1    Castano, S.2    Fugini, M.G.3
  • 107
    • 78651384017 scopus 로고    scopus 로고
    • Satisfiability and resiliency in workflow authorization systems
    • Q. Wang, and N. Li Satisfiability and resiliency in workflow authorization systems ACM Trans. Inform. Syst. Security (TISSEC) 13 2010 40:1 40:35
    • (2010) ACM Trans. Inform. Syst. Security (TISSEC) , vol.13 , pp. 401-4035
    • Wang, Q.1    Li, N.2
  • 109
    • 75649086163 scopus 로고    scopus 로고
    • Specification, verification and explanation of violation for data aware compliance rules
    • Lecture Notes in Computer Science Springer
    • A. Awad, M. Weidlich, and M. Weske Specification, verification and explanation of violation for data aware compliance rules Service-Oriented Computing Lecture Notes in Computer Science vol. 5900 2009 Springer 500 515
    • (2009) Service-Oriented Computing , vol.5900 , pp. 500-515
    • Awad, A.1    Weidlich, M.2    Weske, M.3
  • 111
    • 78649924571 scopus 로고    scopus 로고
    • On enabling data-aware compliance checking of business process models
    • J. Parsons, M. Saeki, P. Shoval, C. Woo, Y. Wand, Lecture Notes in Computer Science Springer
    • D. Knuplesch, L.T. Ly, S. Rinderle-Ma, H. Pfeifer, and P. Dadam On enabling data-aware compliance checking of business process models J. Parsons, M. Saeki, P. Shoval, C. Woo, Y. Wand, Conceptual Modeling - ER 2010 Lecture Notes in Computer Science vol. 6412 2010 Springer 332 346
    • (2010) Conceptual Modeling - ER 2010 , vol.6412 , pp. 332-346
    • Knuplesch, D.1    Ly, L.T.2    Rinderle-Ma, S.3    Pfeifer, H.4    Dadam, P.5
  • 115
    • 84861459429 scopus 로고    scopus 로고
    • On enabling integrated process compliance with semantic constraints in process management systems - Requirements, challenges, solutions
    • L.T. Ly, S. Rinderle-Ma, K. Göser, and P. Dadam On enabling integrated process compliance with semantic constraints in process management systems - requirements, challenges, solutions Inform. Syst. Front. 14 2012 195 219
    • (2012) Inform. Syst. Front. , vol.14 , pp. 195-219
    • Ly, L.T.1    Rinderle-Ma, S.2    Göser, K.3    Dadam, P.4
  • 116
    • 14544287677 scopus 로고    scopus 로고
    • Specification and validation of process constraints for flexible workflows
    • S.W. Sadiq, M.E. Orlowska, and W. Sadiq Specification and validation of process constraints for flexible workflows Inform. Syst. 30 2005 349 378
    • (2005) Inform. Syst. , vol.30 , pp. 349-378
    • Sadiq, S.W.1    Orlowska, M.E.2    Sadiq, W.3
  • 118
    • 36049040272 scopus 로고    scopus 로고
    • Integration and verification of semantic constraints in adaptive process management systems
    • L.T. Ly, S. Rinderle, and P. Dadam Integration and verification of semantic constraints in adaptive process management systems Data Knowl. Eng. 64 2008 3 23
    • (2008) Data Knowl. Eng. , vol.64 , pp. 3-23
    • Ly, L.T.1    Rinderle, S.2    Dadam, P.3
  • 123
  • 128
    • 33749635457 scopus 로고    scopus 로고
    • A declarative approach for flexible business processes management
    • J. Eder, S. Dustdar, Lecture Notes in Computer Science Springer
    • M. Pesic, and W.M.P. van der Aalst A declarative approach for flexible business processes management J. Eder, S. Dustdar, Proceedings of the Business Process Management Workshops Lecture Notes in Computer Science vol. 4103 2006 Springer 169 180
    • (2006) Proceedings of the Business Process Management Workshops , vol.4103 , pp. 169-180
    • Pesic, M.1    Van Der Aalst, W.M.P.2
  • 131
    • 77953985972 scopus 로고    scopus 로고
    • Visualization of compliance violation in business process models
    • Lecture Notes in Business Information Processing Springer
    • A. Awad, and M. Weske Visualization of compliance violation in business process models Proceedings of the Business Process Management Workshops Lecture Notes in Business Information Processing vol. 43 2009 Springer 182 193
    • (2009) Proceedings of the Business Process Management Workshops , vol.43 , pp. 182-193
    • Awad, A.1    Weske, M.2
  • 137
    • 84856573172 scopus 로고    scopus 로고
    • Conformance checking of RBAC policies in process-aware information systems
    • Lecture Notes in Business Information Processing Springer
    • A. Baumgrass, T. Baier, J. Mendling, and M. Strembeck Conformance checking of RBAC policies in process-aware information systems Proceedings of the Business Process Management Workshops Lecture Notes in Business Information Processing vol. 100 2011 Springer 435 446
    • (2011) Proceedings of the Business Process Management Workshops , vol.100 , pp. 435-446
    • Baumgrass, A.1    Baier, T.2    Mendling, J.3    Strembeck, M.4
  • 140
    • 56049101373 scopus 로고    scopus 로고
    • Towards comprehensive support for organizational mining
    • M. Song, and W.M.P. van der Aalst Towards comprehensive support for organizational mining Decis. Support Syst. 46 2008 300 317
    • (2008) Decis. Support Syst. , vol.46 , pp. 300-317
    • Song, M.1    Van Der Aalst, W.M.P.2
  • 141
    • 33745134088 scopus 로고    scopus 로고
    • Mining staff assignment rules from event-based data
    • Lecture Notes in Computer Science Springer
    • L. Ly, S. Rinderle, P. Dadam, and M. Reichert Mining staff assignment rules from event-based data Business Process Management Workshops Lecture Notes in Computer Science vol. 3812 2005 Springer 177 190
    • (2005) Business Process Management Workshops , vol.3812 , pp. 177-190
    • Ly, L.1    Rinderle, S.2    Dadam, P.3    Reichert, M.4
  • 142
    • 84873176389 scopus 로고    scopus 로고
    • A case study on the suitability of process mining to produce current-state RBAC model
    • Lecture Notes in Business Information Processing Springer Tallinn, Estonia
    • M. Leitner, A. Baumgrass, S. Schefer-Wenzl, S. Rinderle-Ma, and M. Strembeck A case study on the suitability of process mining to produce current-state RBAC model Proceedings of the Business Process Management Workshops Lecture Notes in Business Information Processing vol. 132 2012 Springer Tallinn, Estonia 719 724
    • (2012) Proceedings of the Business Process Management Workshops , vol.132 , pp. 719-724
    • Leitner, M.1    Baumgrass, A.2    Schefer-Wenzl, S.3    Rinderle-Ma, S.4    Strembeck, M.5
  • 145
    • 70349338903 scopus 로고    scopus 로고
    • Effect of using automated auditing tools on detecting compliance failures in unmanaged processes
    • Lecture Notes in Computer Science Springer
    • Y. Doganata, and F. Curbera Effect of using automated auditing tools on detecting compliance failures in unmanaged processes Proceedings of the 7th International Conference on Business Process Management Lecture Notes in Computer Science vol. 5701 2009 Springer 310 326
    • (2009) Proceedings of the 7th International Conference on Business Process Management , vol.5701 , pp. 310-326
    • Doganata, Y.1    Curbera, F.2
  • 148
    • 0000865747 scopus 로고    scopus 로고
    • Specification and implementation of exceptions in workflow management systems
    • F. Casati, S. Ceri, S. Paraboschi, and G. Pozzi Specification and implementation of exceptions in workflow management systems ACM Trans. Database Syst. (TODS) 24 1999 405 451
    • (1999) ACM Trans. Database Syst. (TODS) , vol.24 , pp. 405-451
    • Casati, F.1    Ceri, S.2    Paraboschi, S.3    Pozzi, G.4
  • 149
    • 0034292030 scopus 로고    scopus 로고
    • Exception handling in workflow management systems
    • C. Hagen, and G. Alonso Exception handling in workflow management systems IEEE Trans. Software Eng. 26 2000 943 958
    • (2000) IEEE Trans. Software Eng. , vol.26 , pp. 943-958
    • Hagen, C.1    Alonso, G.2
  • 152
    • 21944450970 scopus 로고    scopus 로고
    • A scheme to specify and implement ad-hoc recovery in workflow systems
    • H.-J. Schek, G. Alonso, F. Saltor, I. Ramos, Lecture Notes in Computer Science Springer
    • J. Tang, and S.-Y. Hwang A scheme to specify and implement ad-hoc recovery in workflow systems H.-J. Schek, G. Alonso, F. Saltor, I. Ramos, Proceedings of the 6th International Conference on Extending Database Technology (EDBT) Lecture Notes in Computer Science vol. 1377 1998 Springer 484 498
    • (1998) Proceedings of the 6th International Conference on Extending Database Technology (EDBT) , vol.1377 , pp. 484-498
    • Tang, J.1    Hwang, S.-Y.2
  • 156
    • 55949102930 scopus 로고    scopus 로고
    • The implementation and evaluation of a recovery system for workflows
    • M. Yu, P. Liu, and W. Zang The implementation and evaluation of a recovery system for workflows J. Network Comput. Appl. 32 2009 158 183
    • (2009) J. Network Comput. Appl. , vol.32 , pp. 158-183
    • Yu, M.1    Liu, P.2    Zang, W.3
  • 164
    • 84902459113 scopus 로고    scopus 로고
    • Interactive access control for web services
    • Y. Deswarte, F. Cuppens, S. Jajodia, L. Wang, IFIP International Federation for Information Processing Springer US
    • H. Koshutanski, and F. Massacci Interactive access control for web services Y. Deswarte, F. Cuppens, S. Jajodia, L. Wang, Security and protection in information processing systems IFIP International Federation for Information Processing vol. 147 2004 Springer US 150 166
    • (2004) Security and Protection in Information Processing Systems , vol.147 , pp. 150-166
    • Koshutanski, H.1    Massacci, F.2
  • 169
    • 33750453781 scopus 로고    scopus 로고
    • Sectet: An extensible framework for the realization of secure inter-organizational workflows
    • M. Hafner, R. Breu, B. Agreiter, and A. Nowak Sectet: an extensible framework for the realization of secure inter-organizational workflows Internet Res. 16 2006 491 506
    • (2006) Internet Res. , vol.16 , pp. 491-506
    • Hafner, M.1    Breu, R.2    Agreiter, B.3    Nowak, A.4
  • 170
    • 73149108190 scopus 로고    scopus 로고
    • SeAAS-A reference architecture for security services in SOA
    • M. Hafner, M. Memon, and R. Breu SeAAS-A reference architecture for security services in SOA J. Universal Comput. Sci. 15 2009 2916 2936
    • (2009) J. Universal Comput. Sci. , vol.15 , pp. 2916-2936
    • Hafner, M.1    Memon, M.2    Breu, R.3
  • 171
    • 81455142699 scopus 로고    scopus 로고
    • Vulnerability analysis in SOA-Based business processes
    • L. Lowis, and R. Accorsi Vulnerability analysis in SOA-Based business processes IEEE Trans. Serv. Comput. 4 2011 230 242
    • (2011) IEEE Trans. Serv. Comput. , vol.4 , pp. 230-242
    • Lowis, L.1    Accorsi, R.2
  • 181
    • 84892574455 scopus 로고    scopus 로고
    • Secure disconnected agent interaction for electronic commerce activities using CapBasED-AMS
    • P.C.K. Hung, and K. Karlapalem Secure disconnected agent interaction for electronic commerce activities using CapBasED-AMS Information Technology and Management 3 2002 329 351
    • (2002) Information Technology and Management , vol.3 , pp. 329-351
    • Hung, P.C.K.1    Karlapalem, K.2
  • 182
    • 0036887432 scopus 로고    scopus 로고
    • Wrappers - A mechanism to support state-based authorisation in web applications
    • M. Olivier, and E. Gudes Wrappers - a mechanism to support state-based authorisation in web applications Data Knowl. Eng. 43 2002 281 292
    • (2002) Data Knowl. Eng. , vol.43 , pp. 281-292
    • Olivier, M.1    Gudes, E.2
  • 183
    • 0036779153 scopus 로고    scopus 로고
    • AutoWF: A secure web workflow system using autonomous objects
    • E. Gudes, and A. Tubman AutoWF: a secure web workflow system using autonomous objects Data Knowl. Eng. 43 2002 1 27
    • (2002) Data Knowl. Eng. , vol.43 , pp. 1-27
    • Gudes, E.1    Tubman, A.2
  • 184
    • 25844517955 scopus 로고    scopus 로고
    • Theoretical and practical issues in evaluating the quality of conceptual models: Current state and future directions
    • D.L. Moody Theoretical and practical issues in evaluating the quality of conceptual models: current state and future directions Data Knowl. Eng. 55 2005 243 276
    • (2005) Data Knowl. Eng. , vol.55 , pp. 243-276
    • Moody, D.L.1
  • 187
    • 84878587195 scopus 로고    scopus 로고
    • Corrective enforcement: A new paradigm of security policy enforcement by monitors
    • R. Khoury, and N. Tawbi Corrective enforcement: a new paradigm of security policy enforcement by monitors ACM Trans. Inform. Syst. Security (TISSEC) 15 2012 10:1 10:27
    • (2012) ACM Trans. Inform. Syst. Security (TISSEC) , vol.15 , pp. 101-1027
    • Khoury, R.1    Tawbi, N.2
  • 192
    • 80955144182 scopus 로고    scopus 로고
    • Roles in information security - A survey and classification of the research area
    • L. Fuchs, G. Pernul, and R. Sandhu Roles in information security - a survey and classification of the research area Comput. Security 30 2011 748 769
    • (2011) Comput. Security , vol.30 , pp. 748-769
    • Fuchs, L.1    Pernul, G.2    Sandhu, R.3
  • 194
    • 47849117407 scopus 로고    scopus 로고
    • Change patterns and change support features - Enhancing flexibility in process-aware information systems
    • B. Weber, M. Reichert, and S. Rinderle-Ma Change patterns and change support features - enhancing flexibility in process-aware information systems Data Knowl. Eng. 66 2008 438 466
    • (2008) Data Knowl. Eng. , vol.66 , pp. 438-466
    • Weber, B.1    Reichert, M.2    Rinderle-Ma, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.