Databases Reference
In-Depth Information
References
1. Workflow reference model. Technical report, Workflow Management Coalition,
1994.
2. V. Atluri.
Security for workflow systems. Information Security Technical Report , 6(2):705-
716, 2001.
3. V. Atluri, E. Bertino, E. Ferrari, and P. Mazzoleni. Supporting delegation in
secure workflow management systems. IFIP WG 11.3 Conference on Data and
Application Security , August 2003.
4. Vijayalakshmi Atluri, Soon Ae Chun, and Pietro Mazzoleni. A chinese wall
security model for decentralized workflow systems. In CCS '01: Proceedings of
the 8th ACM conference on Computer and Communications Security , 2001.
5. Vijayalakshmi Atluri and Wei-Kuang Huang. An Authorization Model for
Workflows. In Proceedings of the Fifth European Symposium on Research in
Computer Security, in Lecture Notes in Computer Science, No.1146, Springer-
Verlag , September 1996.
6. Vijayalakshmi Atluri and Wei-Kuang Huang. A Petri Net Based Safety Analysis
of Workflow Authorization Models. Journal of Computer Security , 8(2/3):209-
240, 2000.
7. Vijayalakshmi Atluri and Janice Warner. Supporting conditional delegation in
secure workflow management systems. In SACMAT , 2005.
8. Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. Trbac: A temporal
role-based access control model. ACM Transactions on Information and System
Security (TISSEC) , 4(3):191-203, 2001.
9. Elisa Bertino, Elena Ferrari, and Vijayalakshmi Atluri. A Flexible Model Sup-
porting the Specification and Enforcement of Role-based Authorizations in
Workflow Management Systems. In Proc. of the 2nd ACM Workshop on Role-
based Access Control , November 1997.
10. Elisa Bertino, Elena Ferrari, and Vijayalakshmi Atluri. An Approach for the
Specification and Enforcement of Authorization Constraints in Workflow Man-
agement Systems. ACM Transactions on Information Systems Security , 2(1),
February 1999.
11. Elisa Bertino, Elena Ferrari, and Vijayalakshmi Atluri. An Approach for the
Specification and Enforcement of Authorization Constraints in Workflow Man-
agement Systems. ACM Transactions on Information Systems Security , 2(1),
February 1999.
12. R. Botha and J. Eloff. Separation of duties for access control enforcement in
workflow environments. IBM Systems Journal , 40(3), 2001.
13. D.F.C. Brewer and M.J. Nash.
The chinese wall security policy.
In IEEE
Symposium on Security and Privacy , 1989.
14. J. Crampton. A reference monitor for workflow systems with constrained task
execution. In SACMAT 05 , 2005.
15. Dimitrios Georgakopoulos, Mark F. Hornick, and Amit P. Sheth. An overview
of workflow management: From process modeling to workflow automation in-
frastructure. Distributed and Parallel Databases , 3(2):119-153, 1995.
16. V. Gligor, S. Gavrila, and D. Ferraiolo. On the formal definition of separation-of-
duty policies and their composition. IEEE Symposium on Research in Security
and Privacy , 1998.
Search WWH ::




Custom Search