Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines
暂无分享,去创建一个
[1] Joon S. Park,et al. Access control mechanisms for inter-organizational workflow , 2001, SACMAT '01.
[2] Wil M. P. van der Aalst,et al. Verification Of Workflow Task Structures: A Petri-net-baset Approach , 2000, Inf. Syst..
[3] Mark Greenwood,et al. Taverna: lessons in creating a workflow environment for the life sciences: Research Articles , 2006 .
[4] Cees T. A. M. de Laat,et al. Distributed execution of aggregated multi domain workflows using an agent framework , 2007, 2007 IEEE Congress on Services (Services 2007).
[5] Shiyong Lu,et al. Storing and Querying Scientific Workflow Provenance Metadata Using an RDBMS , 2007, Third IEEE International Conference on e-Science and Grid Computing (e-Science 2007).
[6] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[7] Jan H. P. Eloff,et al. A framework for access control in workflow systems , 2001, Inf. Manag. Comput. Secur..
[8] Rajeev Alur,et al. Exploiting Behavioral Hierarchy for Efficient Model Checking , 2002, CAV.
[9] Jan H. P. Eloff,et al. Separation of duties for access control enforcement in workflow environments , 2001, IBM Syst. J..
[10] Rajeev Alur,et al. Model checking of hierarchical state machines , 1998, TOPL.
[11] C. R. Ramakrishnan,et al. Logic based modeling and analysis of workflows , 1998, PODS '98.
[12] Bertram Ludäscher,et al. Scientific workflow management and the Kepler system: Research Articles , 2006 .
[13] Gregor von Laszewski,et al. Swift: Fast, Reliable, Loosely Coupled Parallel Computation , 2007, 2007 IEEE Congress on Services (Services 2007).
[14] Jing Hua,et al. Cocluster analysis of thalamo-cortical fibre tracts extracted from diffusion tensor MRI , 2008, Int. J. Data Min. Bioinform..
[15] Vijayalakshmi Atluri,et al. Supporting conditional delegation in secure workflow management systems , 2005, SACMAT '05.
[16] Vijayalakshmi Atluri,et al. Modeling and Analysis of Workflows Using Petri Nets , 1998, Journal of Intelligent Information Systems.
[17] Rajeev Alur. Formal Analysis of Hierarchical State Machines , 2003, Verification: Theory and Practice.
[18] Henrik Stormer,et al. Modeling and Analyzing Separation of Duties in Workflow Environments , 2001, SEC.
[19] Rik Eshuis,et al. Verification support for workflow design with UML activity graphs , 2002, ICSE '02.
[20] Jason Maassen,et al. Programming Scientific and Distributed Workflow with Triana Services , 2004 .
[21] Ian Taylor,et al. Programming scientific and distributed workflow with Triana services: Research Articles , 2006 .
[22] Shiyong Lu,et al. VIEW: a VIsual sciEntificWorkflow management system , 2007, 2007 IEEE Congress on Services (Services 2007).
[23] Shiyong Lu,et al. Automatic workflow verification and generation , 2006, Theor. Comput. Sci..
[24] Anne H. H. Ngu,et al. Enabling ScientificWorkflow Reuse through Structured Composition of Dataflow and Control-Flow , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[25] Carole A. Goble,et al. Guest editors' introduction to the special section on scientific workflows , 2005, SGMD.
[26] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[27] Yong Tang,et al. Workflow Analysis Based on Fuzzy Temporal Workflow Nets , 2005, CSCWD.
[28] Xinlei Zhao,et al. Hierarchical Reachability Analysis for Workflow-Nets , 2006, 2006 10th International Conference on Computer Supported Cooperative Work in Design.
[29] Dan C. Marinescu,et al. Structural soundness of workflow nets is decidable , 2005, Inf. Process. Lett..
[30] Claude Godart,et al. Information Flow Control with Decentralized Service Compositions , 2007, IEEE International Conference on Web Services (ICWS 2007).
[31] Melanie Volkamer,et al. Information Flow Control to Secure Dynamic Web Service Composition , 2006, SPC.
[32] Cláudio T. Silva,et al. Managing Rapidly-Evolving Scientific Workflows , 2006, IPAW.
[33] Randal E. Bryant,et al. Graph-Based Algorithms for Boolean Function Manipulation , 1986, IEEE Transactions on Computers.
[34] Akhil Kumar,et al. DW-RBAC: A formal security model of delegation and revocation in workflow systems , 2007, Inf. Syst..
[35] Ian T. Foster,et al. Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.
[36] Peng Li,et al. Practical information flow control in Web-based information systems , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[37] Marlon Dumas,et al. UML Activity Diagrams as a Workflow Specification Language , 2001, UML.
[38] Liviu Iftode,et al. Information Flow Control for Location-based Services , 2006 .
[39] Elisa Bertino,et al. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control , 2005, TSEC.
[40] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[41] Susan B. Davidson,et al. Towards a Model of Provenance and User Views in Scientific Workflows , 2006, DILS.
[42] Shengli Wu,et al. Authorization and Access Control of Application Data in Workflow Systems , 2004, Journal of Intelligent Information Systems.
[43] Yolanda Gil,et al. Artificial intelligence and grids: workflow planning and beyond , 2004, IEEE Intelligent Systems.
[44] Edward A. Lee,et al. CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. 2000; 00:1–7 Prepared using cpeauth.cls [Version: 2002/09/19 v2.02] Taverna: Lessons in creating , 2022 .
[45] Edward A. Lee,et al. Scientific workflow management and the Kepler system , 2006, Concurr. Comput. Pract. Exp..