A Secure Workflow Model
暂无分享,去创建一个
[1] Vijayalakshmi Atluri,et al. An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment , 1996, DBSec.
[2] Elisa Bertino,et al. An Execution Model for Multilevel Seccure Workflows , 1997, DBSec.
[3] Günther Pernul,et al. Security constraint processing during multilevel secure database design , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[4] Walid G. Aref,et al. Security models for web-based applications , 2001, CACM.
[5] Patrick C. K. Hung. Specifying conflict of interest in web services endpoint language (WSEL) , 2002, SECO.
[6] Chris Clifton,et al. Directions for Web and e-commerce applications security , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.
[7] Giorgio De Michelis,et al. Net Theory and Workflow Models (abstract) , 1999, ICATPN.
[8] Joon S. Park,et al. Access control mechanisms for inter-organizational workflow , 2001, SACMAT '01.
[9] Ivar Jacobson,et al. The Unified Modeling Language User Guide , 1998, J. Database Manag..
[10] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[11] Vijayalakshmi Atluri,et al. SecureFlow: a secure Web-enabled workflow management system , 1999, RBAC '99.
[12] Vijayalakshmi Atluri,et al. An Authorization Model for Workflows , 1996, ESORICS.