Databases Reference
In-Depth Information
17. Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman. Protection in
operating systems.
Commun. ACM , 19(8), 1976.
18. Wei-Kuang Huang and Vijayalakshmi Atluri. Analyzing the Safety of Work-
flow Authorization Models. In Proc. of the 12th IFIP WG 11.3 Workshop on
Database Security , July 1998.
19. Patrick C. K. Hung and Kamalakar Karlapalem2. A secure workflow model. In
AISW2003 , 2003.
20. Myong H. Kang, Joon S. Park, and Judith N. Froscher. Access control mecha-
nisms for inter-organizational workflows. In SACMAT , 2001.
21. K. Knorr and H. Stormer. Modeling and anlying separation of duties in work-
flow environments. In IFIP TC11 Sixtgeenth Annual Working Conference on
Information Security , 2001.
22. Hristo Koshutanski and Fabio Massacci. Interactive access control for web ser-
vices. SEC , pages 151-166, 2004.
23. Marek Rusinkiewicz and Amit P. Sheth. Transactional workflow management
in distributed systems (invited paper). In Proceedings of the First International
Workshop on Advances in Databases and Information Systems, Moscow, Russia,
May 23 - 26, 1994 , pages 18-33, 1994.
24. Ravi S. Sandhu. Transaction Control Expressions for Separation of Duties. In
Fourth Computer Security Applications Conference , pages 282-286, 1988.
25. Andreas Schaad, Volkmar Lotz, and Karsten Sohr. A model-checking approach
to analysing organisational controls in a loan origination process. In SACMAT
'06: Proceedings of the eleventh ACM symposium on Access control models and
technologies , 2006.
26. K. Tan, J. Crampton, and C. Gunter. The consistency of task-based authoriza-
tion constraints in workflow systems. In Proceedings of the 17th IEEE Computer
Security Foundations Workshop (CSFW04 , 2004.
27. J. Wainer, P. Barthelmess, and A. Kumar. W-rbac: A workflow security model
incorporating controlled overriding of constraints. In International Journal of
Cooperative Information Systems , volume 12, 2003.
28. Janice Warner and Vijayalakshmi Atluri. Inter-instance authorization con-
straints for secure workflow management. In SACMAT , 2006.
Search WWH ::




Custom Search