-
2
-
-
84905103338
-
-
Oracle Role Manager, 2013. < http://www.oracle.com/us/products/ middleware/identity-management/oracle-role-manager/overview/index.html >.
-
(2013)
Oracle Role Manager
-
-
-
3
-
-
84905115257
-
-
SAP Virsa Firefighter, 2013. < http://sapsecurity.info/virsa- firefighter/ >.
-
(2013)
SAP Virsa Firefighter
-
-
-
4
-
-
34748891724
-
Overriding of access control in XACML
-
Springer Washington, DC, USA
-
J. Alqatawna, E. Rissanen, and B. Sadighi Overriding of access control in XACML Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks 2007 Springer Washington, DC, USA 87 95
-
(2007)
Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 87-95
-
-
Alqatawna, J.1
Rissanen, E.2
Sadighi, B.3
-
5
-
-
78449288160
-
Access control for smarter healthcare using policy spaces
-
C.A. Ardagna, S.D.C. di Vimercati, S. Foresti, T.W. Grandison, S. Jajodia, and P. Samarati Access control for smarter healthcare using policy spaces Comput. Secur. 29 8 2010 848 858
-
(2010)
Comput. Secur.
, vol.29
, Issue.8
, pp. 848-858
-
-
Ardagna, C.A.1
Di Vimercati, S.D.C.2
Foresti, S.3
Grandison, T.W.4
Jajodia, S.5
Samarati, P.6
-
8
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri The specification and enforcement of authorization constraints in workflow management systems ACM Trans. Inf. Syst. Secur. (TISSEC) 2 1 1999
-
(1999)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.2
, Issue.1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
9
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
R.A. Botha, and J.H. Eloff Separation of duties for access control enforcement in workflow environments IBM Syst. J. 40 3 2001
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
-
-
Botha, R.A.1
Eloff, J.H.2
-
14
-
-
84856142480
-
Secure information sharing on support of emergency management
-
B. Carminati, E. Ferrari, M. Guglielmi, Secure information sharing on support of emergency management, in: Proc. of the International Conference on Privacy, Security, Risk and Trust, 2011.
-
(2011)
Proc. of the International Conference on Privacy, Security, Risk and Trust
-
-
Carminati, B.1
Ferrari, E.2
Guglielmi, M.3
-
15
-
-
0000865747
-
Specification and implementation of exceptions in workflow management systems
-
F. Casati, S. Ceri, S. Paraboschi, and G. Pozzi Specification and implementation of exceptions in workflow management systems ACM Trans. Database Syst. 24 1999 405 451
-
(1999)
ACM Trans. Database Syst.
, vol.24
, pp. 405-451
-
-
Casati, F.1
Ceri, S.2
Paraboschi, S.3
Pozzi, G.4
-
16
-
-
0033115129
-
A meta modeling approach to workflow management systems supporting exception handling
-
D.K.W. Chiu, Q. Li, and K. Karlapalem A meta modeling approach to workflow management systems supporting exception handling Inf. Syst. 24 1999 159 184
-
(1999)
Inf. Syst.
, vol.24
, pp. 159-184
-
-
Chiu, D.K.W.1
Li, Q.2
Karlapalem, K.3
-
21
-
-
85023161437
-
Understanding business process models: The costs and benefits of structuredness
-
M. Dumas, M.L. Rosa, J. Mendling, R. Maesaku, R. Hajo A, N. Semenenko, Understanding business process models: the costs and benefits of structuredness, in: Prod. of the 24th International Conference on Advanced Information Systems Engineering (CAiSE), 2012.
-
(2012)
Prod. of the 24th International Conference on Advanced Information Systems Engineering (CAiSE)
-
-
Dumas, M.1
Rosa, M.L.2
Mendling, J.3
Maesaku, R.4
Hajo A, R.5
Semenenko, N.6
-
23
-
-
77649181757
-
How to securely break into RBAC: The BTG-RBAC model
-
December
-
A. Ferreira, D. Chadwick, P. Farinha, R. Correia, G. Zao, R. Chilro, L. Antunes, How to securely break into RBAC: the BTG-RBAC model, in: Proceedings of the 2009 Annual Computer Security Applications Conference, December 2009.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference
-
-
Ferreira, A.1
Chadwick, D.2
Farinha, P.3
Correia, R.4
Zao, G.5
Chilro, R.6
Antunes, L.7
-
24
-
-
33845638417
-
How to break access control in a controlled manner
-
A. Ferreira, R. Cruz-Correia, L. Antunes, P. Farinha, E. Oliveira-Palhares, D.W. Chadwick, A. Costa-Pereira, How to break access control in a controlled manner, in: Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems, 2006.
-
(2006)
Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems
-
-
Ferreira, A.1
Cruz-Correia, R.2
Antunes, L.3
Farinha, P.4
Oliveira-Palhares, E.5
Chadwick, D.W.6
Costa-Pereira, A.7
-
25
-
-
0035790754
-
Flexible team-based access control using contexts
-
May
-
C.K. Georgiadis, I. Mavridis, G. Pangalos, R.K. Thomas, Flexible team-based access control using contexts, in: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT), May 2001.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
26
-
-
84899976809
-
Modeling and enforcing secure object flows in process-driven SOAs: An integrated model-driven approach
-
B. Hoisl, S. Sobernig, and M. Strembeck Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach Software Syst. Model. (SoSyM) 13 2 2014
-
(2014)
Software Syst. Model. (SoSyM)
, vol.13
, Issue.2
-
-
Hoisl, B.1
Sobernig, S.2
Strembeck, M.3
-
28
-
-
79960184348
-
Rumpole: A flexible break-glass access control model
-
S. Marinovic, R. Craven, J. Ma, N. Dulay, Rumpole: a flexible break-glass access control model, in: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT), 2011.
-
(2011)
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Marinovic, S.1
Craven, R.2
Ma, J.3
Dulay, N.4
-
30
-
-
77954504239
-
From goal-driven security requirements engineering to secure design
-
H. Mouratidis, and J. Jürjens From goal-driven security requirements engineering to secure design Int. J. Intell. Syst. 25 8 2010
-
(2010)
Int. J. Intell. Syst.
, vol.25
, Issue.8
-
-
Mouratidis, H.1
Jürjens, J.2
-
32
-
-
0038825675
-
Task-role-based access control model
-
S. Oh, and S. Park Task-role-based access control model Inf. Syst. 28 6 2003
-
(2003)
Inf. Syst.
, vol.28
, Issue.6
-
-
Oh, S.1
Park, S.2
-
33
-
-
84905108671
-
-
OMG January 2009, Version 1.2, formal/2009-01-03, The Object Management Group
-
OMG. OMG Business Process Modeling Notation, < http://www.omg.org/ spec/BPMN/1.2/ > January 2009, Version 1.2, formal/2009-01-03, The Object Management Group.
-
OMG Business Process Modeling Notation
-
-
-
34
-
-
84883792913
-
-
OMG February 2010, Version 2.2, formal/2010-02-01, The Object Management Group
-
OMG. Object Constraint Language Specification, < http://www.omg.org/ technology/documents/formal/ocl.htm > February 2010, Version 2.2, formal/2010-02-01, The Object Management Group.
-
Object Constraint Language Specification
-
-
-
35
-
-
77951438093
-
-
OMG May 2010. Version 2.3, formal/2010-05-03, The Object Management Group
-
OMG, Unified Modeling Language (OMG UML): Superstructure, < http://www.omg.org/technology/documents/formal/uml.htm > May 2010. Version 2.3, formal/2010-05-03, The Object Management Group.
-
Unified Modeling Language (OMG UML): Superstructure
-
-
-
39
-
-
0032024112
-
Adept-flex-supporting dynamic changes of workflows without losing control
-
M. Reichert, and P. Dadam Adept-flex-supporting dynamic changes of workflows without losing control J. Intell. Inf. Syst. 10 2 1998
-
(1998)
J. Intell. Inf. Syst.
, vol.10
, Issue.2
-
-
Reichert, M.1
Dadam, P.2
-
40
-
-
70350294331
-
Flexibility in process-aware information systems
-
K. Jensen, W.M. Aalst, Springer-Verlag Berlin, Heidelberg
-
M. Reichert, S. Rinderle-Ma, and P. Dadam Flexibility in process-aware information systems K. Jensen, W.M. Aalst, Transactions on Petri Nets and Other Models of Concurrency II 2009 Springer-Verlag Berlin, Heidelberg 115 135
-
(2009)
Transactions on Petri Nets and Other Models of Concurrency II
, pp. 115-135
-
-
Reichert, M.1
Rinderle-Ma, S.2
Dadam, P.3
-
43
-
-
61849169018
-
Guidelines for conducting and reporting case study research in software engineering
-
P. Runeson, and M. Höst Guidelines for conducting and reporting case study research in software engineering Empirical Software Eng. 14 2 2009
-
(2009)
Empirical Software Eng.
, vol.14
, Issue.2
-
-
Runeson, P.1
Höst, M.2
-
44
-
-
33746204796
-
Workflow resource patterns: Identification, representation and tool support
-
N. Russell, A.H.M.T. Hofstede, D. Edmond, Workflow resource patterns: identification, representation and tool support, in: Proceedings of the 17th Conference on Advanced Information Systems Engineering (CAiSE'05), volume 3520 of Lecture Notes in Computer Science, 2005.
-
(2005)
Proceedings of the 17th Conference on Advanced Information Systems Engineering (CAiSE'05), Volume 3520 of Lecture Notes in Computer Science
-
-
Russell, N.1
Hofstede, A.H.M.T.2
Edmond, D.3
-
46
-
-
85035684204
-
Modeling process-related duties with extended UML activity and interaction diagrams
-
March 2011
-
S. Schefer, M. Strembeck, Modeling process-related duties with extended UML activity and interaction diagrams, in: Proc. of the International Workshop on Flexible Workflows in Distributed Systems, Workshops der wissenschaftlichen Konferenz Kommunikation in verteilten Systemen (WowKiVS), Electronic Communications of the EASST, vol. 37, March 2011.
-
Proc. of the International Workshop on Flexible Workflows in Distributed Systems, Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen (WowKiVS), Electronic Communications of the EASST
, vol.37
-
-
Schefer, S.1
Strembeck, M.2
-
47
-
-
84898423580
-
Modeling support for delegating roles, tasks, and duties in a process-related RBAC context
-
Lecture Notes in Business Information Processing (LNBIP) Springer Verlag
-
S. Schefer, and M. Strembeck Modeling support for delegating roles, tasks, and duties in a process-related RBAC context International Workshop on Information Systems Security Engineering (WISSE) Lecture Notes in Business Information Processing (LNBIP) 2011 Springer Verlag
-
(2011)
International Workshop on Information Systems Security Engineering (WISSE)
-
-
Schefer, S.1
Strembeck, M.2
-
48
-
-
84884162558
-
Checking satisfiability aspects of binding constraints in a business process context
-
S. Schefer, M. Strembeck, J. Mendling, Checking satisfiability aspects of binding constraints in a business process context, in: BPM 2011 Workshops (2), Proc. of the BPM Workshop on Workflow Security Audit and Certification (WfSAC), 2011.
-
(2011)
BPM 2011 Workshops (2), Proc. of the BPM Workshop on Workflow Security Audit and Certification (WfSAC)
-
-
Schefer, S.1
Strembeck, M.2
Mendling, J.3
-
49
-
-
84905118236
-
Detecting and resolving conflicts of mutual-exclusion and binding constraints in a business process context
-
October
-
S. Schefer, M. Strembeck, J. Mendling, A. Baumgrass, Detecting and resolving conflicts of mutual-exclusion and binding constraints in a business process context, in: OTM Conferences (1) 2011, Proc. of the 19th International Conference on Cooperative Information Systems (CoopIS), October 2011.
-
(2011)
OTM Conferences (1) 2011, Proc. of the 19th International Conference on Cooperative Information Systems (CoopIS)
-
-
Schefer, S.1
Strembeck, M.2
Mendling, J.3
Baumgrass, A.4
-
54
-
-
33344465743
-
Model-driven engineering - Guest editorś introduction
-
D.C. Schmidt Model-driven engineering - guest editorś introduction IEEE Comput. 39 2 2006
-
(2006)
IEEE Comput.
, vol.39
, Issue.2
-
-
Schmidt, D.C.1
-
55
-
-
0141725660
-
The pragmatics of model-driven development
-
B. Selic The pragmatics of model-driven development IEEE Software 20 5 2003
-
(2003)
IEEE Software
, vol.20
, Issue.5
-
-
Selic, B.1
-
58
-
-
77249095368
-
Scenario-driven role engineering
-
M. Strembeck Scenario-driven role engineering IEEE Secur. Privacy 8 1 2010
-
(2010)
IEEE Secur. Privacy
, vol.8
, Issue.1
-
-
Strembeck, M.1
-
59
-
-
78650098860
-
Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context
-
Lecture Notes in Computer Science (LNCS) Springer Verlag
-
M. Strembeck, and J. Mendling Generic algorithms for consistency checking of mutual-exclusion and binding constraints in a business process context Proc. of the 18th International Conference on Cooperative Information Systems (CoopIS) Lecture Notes in Computer Science (LNCS) vol. 6426 2010 Springer Verlag
-
(2010)
Proc. of the 18th International Conference on Cooperative Information Systems (CoopIS)
, vol.6426
-
-
Strembeck, M.1
Mendling, J.2
-
60
-
-
79952439750
-
Modeling process-related RBAC models with extended UML activity models
-
M. Strembeck, and J. Mendling Modeling process-related RBAC models with extended UML activity models Inf. Software Technol. 53 5 2011
-
(2011)
Inf. Software Technol.
, vol.53
, Issue.5
-
-
Strembeck, M.1
Mendling, J.2
-
61
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environments
-
M. Strembeck, and G. Neumann An integrated approach to engineer and enforce context constraints in RBAC environments ACM Trans. Inf. Syst. Secur. (TISSEC) 7 3 2004
-
(2004)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.7
, Issue.3
-
-
Strembeck, M.1
Neumann, G.2
-
62
-
-
70349874815
-
An approach for the systematic development of domain-specific languages
-
M. Strembeck, and U. Zdun An approach for the systematic development of domain-specific languages Software: Pract. Exper. (SP&E) 39 15 2009
-
(2009)
Software: Pract. Exper. (SP&E)
, vol.39
, Issue.15
-
-
Strembeck, M.1
Zdun, U.2
-
67
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
J. Wainer, P. Barthelmess, and A. Kumar W-RBAC - a workflow security model incorporating controlled overriding of constraints Int. J. Coop. Inf. Syst. (IJCIS) 12 4 2003
-
(2003)
Int. J. Coop. Inf. Syst. (IJCIS)
, vol.12
, Issue.4
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
71
-
-
38049132539
-
Modeling of task-based authorization constraints in BPMN
-
G. Alonso, P. Dadam, M. Rosemann, Lecture Notes in Computer Science Springer Berlin/ Heidelberg
-
C. Wolter, and A. Schaad Modeling of task-based authorization constraints in BPMN G. Alonso, P. Dadam, M. Rosemann, Business Process Management Lecture Notes in Computer Science vol. 4714 2007 Springer Berlin/ Heidelberg
-
(2007)
Business Process Management
, vol.4714
-
-
Wolter, C.1
Schaad, A.2
-
73
-
-
34249655677
-
Object-based and class-based composition of transitive mixins
-
U. Zdun, M. Strembeck, and G. Neumann Object-based and class-based composition of transitive mixins Inf. Software Technol. 49 8 2007
-
(2007)
Inf. Software Technol.
, vol.49
, Issue.8
-
-
Zdun, U.1
Strembeck, M.2
Neumann, G.3
|