-
1
-
-
0033650839
-
Injecting RBAC to secure a web-based workflow system
-
Ahn, G.J., Sandhu, R., Kang, M., Park, J., 2000. Injecting RBAC to secure a web-based workflow system. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-Based Access Control
-
-
Ahn, G.J.1
Sandhu, R.2
Kang, M.3
Park, J.4
-
2
-
-
0035750945
-
A Chinese wall security model for decentralized workflow systems
-
Atluri, V., Chun, S.A., Mazzoleni, P., 2001. A Chinese wall security model for decentralized workflow systems. In: Proceedings of the 8th ACM Conference on Computing and Communication Security, 2001.
-
(2001)
Proceedings of the 8th ACM Conference on Computing and Communication Security, 2001
-
-
Atluri, V.1
Chun, S.A.2
Mazzoleni, P.3
-
3
-
-
0242625201
-
Model driven security for process-oriented systems
-
Basin, D., Doser, J., Lodderstedt, T., 2003. Model driven security for process-oriented systems. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Applications, pp. 100-109.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Applications
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
5
-
-
1642294255
-
Petri-net-based context-related access control in workflow environment
-
Dong, X., Chen, G., Yin, J., Dong, J., 2002. Petri-net-based context-related access control in workflow environment. In: Proceedings of the 7th International Conference on Computer Suported Cooperative Work in Design.
-
(2002)
Proceedings of the 7th International Conference on Computer Suported Cooperative Work in Design
-
-
Dong, X.1
Chen, G.2
Yin, J.3
Dong, J.4
-
7
-
-
33747074188
-
An overview of workflow management: From process modeling to workflow automation infrastructure
-
Georgakopoulos, D., Hornick, M., Sheth, A., 1995. An overview of workflow management: from process modeling to workflow automation infrastructure. Distributed and Parallel Databases 3, 119-153.
-
(1995)
Distributed and Parallel Databases
, vol.3
, pp. 119-153
-
-
Georgakopoulos, D.1
Hornick, M.2
Sheth, A.3
-
8
-
-
0016984825
-
Protection in operating systems
-
Harrison, M.H., Ruzzo, W.L., Ullman, J.D., 1976. Protection in operating systems. Communications of the ACM 19 (8), 461-471.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.H.1
Ruzzo, W.L.2
Ullman, J.D.3
-
11
-
-
84958973327
-
A multilevel secure workflow management system
-
Kang, M.H., Froscher, J.N., Sheth, A.P., Kochut, K.J., 1999b. A multilevel secure workflow management system. In: Proceedings of 11th Conference on Advanced Information Systems Engineering.
-
(1999)
Proceedings of 11th Conference on Advanced Information Systems Engineering
-
-
Kang, M.H.1
Froscher, J.N.2
Sheth, A.P.3
Kochut, K.J.4
-
16
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
Myers, A., Liskov, B., 1998. Complete, safe information flow with decentralized labels. In: Proceedings of the 14th IEEE Symposium on Security and Privacy, pp. 186-197.
-
(1998)
Proceedings of the 14th IEEE Symposium on Security and Privacy
, pp. 186-197
-
-
Myers, A.1
Liskov, B.2
-
17
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
Myers, A., Liskov, B., 2000. Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology 9 (4), 410-442.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.1
Liskov, B.2
-
19
-
-
0010634781
-
Specifying application-level security in workflow systems
-
Olivier, M.S., van de Riet, R.T., Gudes, E., 1998. Specifying application-level security in workflow systems. In: Proceeding of the 9th International Workshop on Database and Expert Systems Applications, pp. 346-351.
-
(1998)
Proceeding of the 9th International Workshop on Database and Expert Systems Applications
, pp. 346-351
-
-
Olivier, M.S.1
Van De Riet, R.T.2
Gudes, E.3
-
20
-
-
9544241157
-
-
Oracle, 2003a. Available from 〈http://www.oracle.com〉.
-
(2003)
-
-
-
21
-
-
9544242560
-
-
Oracle, 2003b. Available from 〈http://sqlzoo.napier.ac.uk/big/ B10501_01/workflow.920/a95265/toc.htm〉.
-
(2003)
-
-
-
23
-
-
47849093816
-
Napoleon: A recipe for workflow
-
Payne, C., Thomsen, D., Bogle, J., O'Brien, R., 1999. Napoleon: a recipe for workflow. In: Proceedings of the 15th Computer Security Applications Conference, pp. 134-142.
-
(1999)
Proceedings of the 15th Computer Security Applications Conference
, pp. 134-142
-
-
Payne, C.1
Thomsen, D.2
Bogle, J.3
O'Brien, R.4
-
26
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
Sandhu, R., Bhamidipati, V., Munawer, Q., 1999. The ARBAC97 model for role-based administration of roles. ACM Transaction on Information and System Security 2 (1), 105-135.
-
(1999)
ACM Transaction on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
27
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E., 1996. Role-based access control models. IEEE Computer 29 (2), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
28
-
-
9544221473
-
-
SAP, 2003. Available from 〈http://www.sap.com〉.
-
(2003)
-
-
-
29
-
-
0004233425
-
-
John Wiley & Sons
-
Silberschatz, A., Galvin, P.B., Gagne, G., 2002. Operating System Concepts, sixth ed. John Wiley & Sons.
-
(2002)
Operating System Concepts, Sixth Ed.
-
-
Silberschatz, A.1
Galvin, P.B.2
Gagne, G.3
-
31
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
Thomas, R.K., Sandhu, R.S., 1997. Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. In: Proceedings of the IFIP WG11.3 Workshop on Database Security.
-
(1997)
Proceedings of the IFIP WG11.3 Workshop on Database Security
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
34
-
-
9544254681
-
-
WfMC, 2003. Available from 〈http://www.wfmc.org〉.
-
(2003)
-
-
-
35
-
-
0034845107
-
A secure transaction environment for workflows in distributed systems
-
Wietrzyk, V.I., Takazawa, M., Orgun, M.A., Varadharajan, V., 2001. A secure transaction environment for workflows in distributed systems. In: Proceedings of the Eighth International Conference on Parallel and Distributed Systems, pp. 198-205.
-
(2001)
Proceedings of the Eighth International Conference on Parallel and Distributed Systems
, pp. 198-205
-
-
Wietrzyk, V.I.1
Takazawa, M.2
Orgun, M.A.3
Varadharajan, V.4
-
36
-
-
9544234319
-
-
WSBPEL, 2003. Available from 〈http://www.collaxa.com/home.index. jsp〉.
-
(2003)
-
-
-
37
-
-
84944718313
-
Multi-version attack recovery for workflow systems
-
Yu, M., Liu, P., Zang, W., 2003. Multi-version attack recovery for workflow systems. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 142-151.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference
, pp. 142-151
-
-
Yu, M.1
Liu, P.2
Zang, W.3
|