-
2
-
-
0001852231
-
Web-based e-catalog systems in B2B procurement
-
Baron, J. P., Shaw, M. J., & Bailey, A. D. (2000). Web-based e-catalog systems in B2B procurement. Communications of the ACM, 43(5), 93–100.
-
(2000)
Communications of the ACM
, vol.43
, Issue.5
, pp. 93-100
-
-
Baron, J.P.1
Shaw, M.J.2
Bailey, A.D.3
-
4
-
-
84944792110
-
TRBAC: A Temporal Role-Based Access Control Model
-
Bertino, E., Bonatti, P. A., & Ferrari, E. (2001) TRBAC: A Temporal Role-Based Access Control Model, ACM Transactions on Information and System Security, 4(3), 191–223.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-223
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
5
-
-
0041524664
-
A logical framework for reasoning about access control models
-
Bertino, E., Catania, B., Ferrari, E. & Perlasca, P. (2003). A logical framework for reasoning about access control models. ACM Transactions on Inofrmation and System Security, 6(1), 71–127.
-
(2003)
ACM Transactions on Inofrmation and System Security
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
6
-
-
0002848811
-
The specifiction and enformcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E. & Atluri, V. (1999). The specifiction and enformcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1), 65–104.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
7
-
-
0035594917
-
Managing Workflow Authorization Constraints through Active Database Technology
-
Casati, F., Castano, S. & Fugini, M. (2001) Managing Workflow Authorization Constraints through Active Database Technology. Information Systems Frontiers, 3(3), 319–338.
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
, pp. 319-338
-
-
Casati, F.1
Castano, S.2
Fugini, M.3
-
8
-
-
0242456748
-
Models for Coalition-based Access Control (CBAC). Seventh ACM Symposium on Access Control Models and Technologies, Monterey, California. eMarket Services. (2002)
-
http:// www.emarketservices.com.
-
Cohen, E., Thomas, R.K., Winsborough, W. & Shands, D. (2002) Models for Coalition-based Access Control (CBAC). Seventh ACM Symposium on Access Control Models and Technologies, Monterey, California. eMarket Services. (2002). Introduction to eMarkets. http:// www.emarketservices.com.
-
(2002)
Introduction to eMarkets
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
-
10
-
-
84992227458
-
Proposed NIST Standard for Role-based Access Control
-
Ferralolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R. & Chandramouli, R. (2001). Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security, 4(3), 224–274
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferralolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
33845417816
-
Federating heterogeneous workflow systems
-
Department of Computer Science, University of Zrich
-
Geppert, A., Kradolfer, M. & Tombros, D. (1998) Federating heterogeneous workflow systems. Technical Report 05, Department of Computer Science, University of Zrich.
-
(1998)
Technical Report 05
-
-
Geppert, A.1
Kradolfer, M.2
Tombros, D.3
-
12
-
-
0000206310
-
Security models for web-based applications
-
Joshi, J. B. D., Aref, W. G., Ghafoor, A. & Spafford, E. H. (2001) Security models for web-based applications. Communications of the ACM, 44(2), 38–44.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
15
-
-
0003504206
-
-
IBM Software Group, May 2001 http://www-3.ibm.com/ software/solutions/webservices/pdf/ WSCA.pdf.
-
Kreger, H. (2001) Web Services Conceptual Architecture. IBM Software Group, May 2001. http://www-3.ibm.com/ software/solutions/webservices/pdf/ WSCA.pdf.
-
(2001)
Web Services Conceptual Architecture
-
-
Kreger, H.1
-
16
-
-
84899168696
-
Winslow: A Business Process Management System with Web Services
-
IBM T.J. Watson Research Center
-
Lee, J., Yang, J. & Chung, J. (2002) Winslow: A Business Process Management System with Web Services. Technical Paper, IBM T.J. Watson Research Center.
-
(2002)
Technical Paper
-
-
Lee, J.1
Yang, J.2
Chung, J.3
-
17
-
-
0036991663
-
Web services and business process management. IBM Systems Journal
-
Leymann, F., Roller, D. & Schmidt M.T. (2002) Web services and business process management. IBM Systems Journal, Special Issue on New Developments in Web Services and E-commerce, 41(2), 198–211.
-
(2002)
Special Issue on New Developments in Web Services and E-commerce
, vol.41
, Issue.2
, pp. 198-211
-
-
Leymann, F.1
Roller, D.2
Schmidt, M.T.3
-
18
-
-
0038208063
-
Business-to-business interactions: issues and enabling technologies
-
Medjahed, B., Benatallah, B., Bouguettaya, A., Ngu, A. H. H., & Elmagarmid, A. K. (2003). Business-to-business interactions: issues and enabling technologies. The VLDB Journal, 12, 59–85.
-
(2003)
The VLDB Journal
, vol.12
, pp. 59-85
-
-
Medjahed, B.1
Benatallah, B.2
Bouguettaya, A.3
Ngu, A.H.H.4
Elmagarmid, A.K.5
-
22
-
-
0030086382
-
Role-based Access Control Models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L. & Youman, C.E. (1996) Role-based Access Control Models. IEEE Computer, 29(2), 38–47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
23
-
-
0031387996
-
Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments
-
Nov. 6–7
-
Thomas, R. K. (1997) Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. 2nd ACM Workshop on Role-Based Access Control, Nov. 6–7, 13 -19.
-
(1997)
2nd ACM Workshop on Role-Based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
24
-
-
0002841051
-
Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management
-
Lake Tahoe, California, August 11–13
-
Thomas, R.K. & Sandhu, R.S. (1997) Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, August 11–13.
-
(1997)
Proceedings of the IFIP WG11.3 Workshop on Database Security
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
25
-
-
0001838826
-
Interorganizational Workflows: An Approach based on Message Sequence Charts and Petri Nets
-
van der Aalst., W.M.P. (1999) Interorganizational Workflows: An Approach based on Message Sequence Charts and Petri Nets. Systems Analysis- Modelling-Simulation. 34(3), 335–367.
-
(1999)
Systems Analysis- Modelling-Simulation
, vol.34
, Issue.3
, pp. 335-367
-
-
van der Aalst, W.M.P.1
-
26
-
-
15744389158
-
Relationship driven access control in a supply web
-
Zhao, J. L., Wang, H. J., Huang, S. S. & Chen, G. (2002) Relationship driven access control in a supply web. Proceedings of the 12th Workshop on Information Technology and Systems (WITS'O2), Barcelona, Spain.
-
(2002)
Proceedings of the 12th Workshop on Information Technology and Systems (WITS'O2), Barcelona, Spain
-
-
Zhao, J.L.1
Wang, H.J.2
Huang, S.S.3
Chen, G.4
|