Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/646646.699195guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Authorization Model for Workflows

Published: 25 September 1996 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2019)Results in Workflow ResiliencyProceedings of the Ninth ACM Conference on Data and Application Security and Privacy10.1145/3292006.3300038(185-196)Online publication date: 13-Mar-2019
  • (2018)Securing the Integrity of Workflows in IoTProceedings of the 2018 International Conference on Embedded Wireless Systems and Networks10.5555/3234847.3234908(252-257)Online publication date: 16-Feb-2018
  • (2017)A simple model of separation of duty for access control modelsComputers and Security10.1016/j.cose.2017.03.01268:C(69-80)Online publication date: 1-Jul-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ESORICS '96: Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
September 1996
363 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 25 September 1996

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Results in Workflow ResiliencyProceedings of the Ninth ACM Conference on Data and Application Security and Privacy10.1145/3292006.3300038(185-196)Online publication date: 13-Mar-2019
  • (2018)Securing the Integrity of Workflows in IoTProceedings of the 2018 International Conference on Embedded Wireless Systems and Networks10.5555/3234847.3234908(252-257)Online publication date: 16-Feb-2018
  • (2017)A simple model of separation of duty for access control modelsComputers and Security10.1016/j.cose.2017.03.01268:C(69-80)Online publication date: 1-Jul-2017
  • (2016)Security-enabled Enactment of Decentralized WorkflowsProceedings of the 9th International Conference on Security of Information and Networks10.1145/2947626.2951957(49-56)Online publication date: 20-Jul-2016
  • (2014)A Framework for Expressing and Enforcing Purpose-Based Privacy PoliciesACM Transactions on Information and System Security10.1145/262968917:1(1-31)Online publication date: 15-Aug-2014
  • (2014)A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directionsInformation and Software Technology10.1016/j.infsof.2013.12.00456:3(273-293)Online publication date: 1-Mar-2014
  • (2014)Association-Based Active Access Control models with balanced scalability and flexibilityComputers in Industry10.1016/j.compind.2013.07.01365:1(116-123)Online publication date: 1-Jan-2014
  • (2011)A model for constraint and delegation managementProceedings of the 7th international conference on Information security practice and experience10.5555/2009103.2009137(362-371)Online publication date: 30-May-2011
  • (2010)InDicoProceedings of the 6th international conference on Security and trust management10.5555/2050149.2050162(194-209)Online publication date: 23-Sep-2010
  • (2010)Satisfiability and Resiliency in Workflow Authorization SystemsACM Transactions on Information and System Security10.1145/1880022.188003413:4(1-35)Online publication date: 1-Dec-2010
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media