Managing the Life Cycle of Access Rules in CEOSIS
暂无分享,去创建一个
[1] Stefanie Rinderle-Ma,et al. A Formal Framework for Adaptive Access Control Models , 2007, J. Data Semant..
[2] Jan H. P. Eloff,et al. A framework for access control in workflow systems , 2001, Inf. Manag. Comput. Secur..
[3] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[4] van der Wmp Wil Aalst,et al. Dealing with workflow change: identification of issues and solutions , 2000 .
[5] Akhil Kumar,et al. W-RBAC - A Workflow Security Model Incorporating Controlled Overriding of Constraints , 2003, Int. J. Cooperative Inf. Syst..
[6] Stefanie Rinderle-Ma,et al. Balancing Flexibility and Security in Adaptive Process Management Systems , 2005, OTM Conferences.
[7] Jurgen Klarmann. A Comprehensive Support for Changes in Organizational Models of Workflow Management Systems , 2001 .
[8] Peter Dadam,et al. Correctness criteria for dynamic changes in workflow systems - a survey , 2004, Data Knowl. Eng..
[9] Stefanie Rinderle-Ma,et al. On the Controlled Evolution of Access Rules in Cooperative Information Systems , 2005, OTM Conferences.
[10] António Rito Silva,et al. Authorization and Access Control in Adaptive Workflows , 2003, ESORICS.
[11] Peter Dadam,et al. Mining Staff Assignment Rules from Event-Based Data , 2005, Business Process Management Workshops.
[12] David Alan Hanson,et al. Data security , 1979, ACM-SE 17.
[13] Peter Dadam,et al. Flexible Support of Team Processes by Adaptive Workflow Systems , 2004, Distributed and Parallel Databases.
[14] Michael zur Muehlen,et al. Resource Modeling in Workflow Applications , 1999 .