메뉴 건너뛰기




Volumn 1, Issue 1, 2004, Pages 21-40

Web Services Enabled E-Market Access Control Model

Author keywords

access control; data security; e market; inter organizational workflow; web services

Indexed keywords


EID: 85001833332     PISSN: 15457362     EISSN: 15465004     Source Type: Journal    
DOI: 10.4018/jwsr.2004010102     Document Type: Article
Times cited : (5)

References (26)
  • 2
    • 0001852231 scopus 로고    scopus 로고
    • Web-based e-catalog systems in B2B procurement
    • Baron, J. P., Shaw, M. J., & Bailey, A. D. (2000). Web-based e-catalog systems in B2B procurement. Communications of the ACM, 43(5), 93–100.
    • (2000) Communications of the ACM , vol.43 , Issue.5 , pp. 93-100
    • Baron, J.P.1    Shaw, M.J.2    Bailey, A.D.3
  • 6
    • 0002848811 scopus 로고    scopus 로고
    • The specifiction and enformcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E. & Atluri, V. (1999). The specifiction and enformcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1), 65–104.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 0035594917 scopus 로고    scopus 로고
    • Managing Workflow Authorization Constraints through Active Database Technology
    • Casati, F., Castano, S. & Fugini, M. (2001) Managing Workflow Authorization Constraints through Active Database Technology. Information Systems Frontiers, 3(3), 319–338.
    • (2001) Information Systems Frontiers , vol.3 , Issue.3 , pp. 319-338
    • Casati, F.1    Castano, S.2    Fugini, M.3
  • 8
    • 0242456748 scopus 로고    scopus 로고
    • Models for Coalition-based Access Control (CBAC). Seventh ACM Symposium on Access Control Models and Technologies, Monterey, California. eMarket Services. (2002)
    • http:// www.emarketservices.com.
    • Cohen, E., Thomas, R.K., Winsborough, W. & Shands, D. (2002) Models for Coalition-based Access Control (CBAC). Seventh ACM Symposium on Access Control Models and Technologies, Monterey, California. eMarket Services. (2002). Introduction to eMarkets. http:// www.emarketservices.com.
    • (2002) Introduction to eMarkets
    • Cohen, E.1    Thomas, R.K.2    Winsborough, W.3    Shands, D.4
  • 11
    • 33845417816 scopus 로고    scopus 로고
    • Federating heterogeneous workflow systems
    • Department of Computer Science, University of Zrich
    • Geppert, A., Kradolfer, M. & Tombros, D. (1998) Federating heterogeneous workflow systems. Technical Report 05, Department of Computer Science, University of Zrich.
    • (1998) Technical Report 05
    • Geppert, A.1    Kradolfer, M.2    Tombros, D.3
  • 15
    • 0003504206 scopus 로고    scopus 로고
    • IBM Software Group, May 2001 http://www-3.ibm.com/ software/solutions/webservices/pdf/ WSCA.pdf.
    • Kreger, H. (2001) Web Services Conceptual Architecture. IBM Software Group, May 2001. http://www-3.ibm.com/ software/solutions/webservices/pdf/ WSCA.pdf.
    • (2001) Web Services Conceptual Architecture
    • Kreger, H.1
  • 16
    • 84899168696 scopus 로고    scopus 로고
    • Winslow: A Business Process Management System with Web Services
    • IBM T.J. Watson Research Center
    • Lee, J., Yang, J. & Chung, J. (2002) Winslow: A Business Process Management System with Web Services. Technical Paper, IBM T.J. Watson Research Center.
    • (2002) Technical Paper
    • Lee, J.1    Yang, J.2    Chung, J.3
  • 23
    • 0031387996 scopus 로고    scopus 로고
    • Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments
    • Nov. 6–7
    • Thomas, R. K. (1997) Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. 2nd ACM Workshop on Role-Based Access Control, Nov. 6–7, 13 -19.
    • (1997) 2nd ACM Workshop on Role-Based Access Control , pp. 13-19
    • Thomas, R.K.1
  • 24
    • 0002841051 scopus 로고    scopus 로고
    • Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management
    • Lake Tahoe, California, August 11–13
    • Thomas, R.K. & Sandhu, R.S. (1997) Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, August 11–13.
    • (1997) Proceedings of the IFIP WG11.3 Workshop on Database Security
    • Thomas, R.K.1    Sandhu, R.S.2
  • 25
    • 0001838826 scopus 로고    scopus 로고
    • Interorganizational Workflows: An Approach based on Message Sequence Charts and Petri Nets
    • van der Aalst., W.M.P. (1999) Interorganizational Workflows: An Approach based on Message Sequence Charts and Petri Nets. Systems Analysis- Modelling-Simulation. 34(3), 335–367.
    • (1999) Systems Analysis- Modelling-Simulation , vol.34 , Issue.3 , pp. 335-367
    • van der Aalst, W.M.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.