Integer and combinatorial optimization
Integer and combinatorial optimization
Resource allocation problems: algorithmic approaches
Resource allocation problems: algorithmic approaches
Role-Based Access Control Models
Computer
Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
From Centralized Workflow Specification to Distributed WorkflowExecution
Journal of Intelligent Information Systems - Special issue on workflow management systems
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Cross-organisational workflow management and co-ordination: WACC'99 workshop report
ACM SIGGROUP Bulletin
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A Chinese wall security model for decentralized workflow systems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Workflow Automation: Overview and Research Issues
Information Systems Frontiers
Virtual Enterprises and Federated Information Sharing
DEXA '98 Proceedings of the 9th International Conference on Database and Expert Systems Applications
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Constraint Processing
Role-Based Access Control
The Complexity and Composability of Secure Interoperation
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
Kepler: An Extensible System for Design and Execution of Scientific Workflows
SSDBM '04 Proceedings of the 16th International Conference on Scientific and Statistical Database Management
On mutually-exclusive roles and separation of duty
Proceedings of the 11th ACM conference on Computer and communications security
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Communications of the ACM - Adaptive complex enterprises
IT-enabled sense-and-respond strategies in complex public organizations
Communications of the ACM - Adaptive complex enterprises
SERAT: SEcure role mApping technique for decentralized secure interoperability
Proceedings of the tenth ACM symposium on Access control models and technologies
Integrating databases and workflow systems
ACM SIGMOD Record
Secure collaboration in mediator-free environments
Proceedings of the 12th ACM conference on Computer and communications security
Composing mappings among data sources
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
GridDB: a data-centric overlay for scientific grids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks
IEEE Journal on Selected Areas in Communications
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Hi-index | 0.01 |
WorkFlow Management Systems (WFMS) coordinate and streamline business processes. Acquiring workflow authorisations and managing workflow authorisation constraints is a challenging problem. Current WFMSs assume a centralised global workflow authorisation model. In this paper, we propose a distributed workflow authorisation model with no central authorisation manager for a mediator-free environment. We provide an on-demand task discovery protocol that enables domains to discover tasks available in other domains. We formulate the workflow authorisation problem as a constraint satisfaction problem to select access paths that satisfy all the workflow authorisation constraints. We propose the Workflow Minimal Authorisation Problem (WMAP), which selects minimal authorisations required to execute the workflowtasks. In addition, we investigate access path overlaps to allow tasks in the same session to share authorisations and we present the Workflow Minimal Authorisation Problem with path Overlaps (WMAPO). Finally, we formulate integer programmes to solve both the WMAP and WMAPO.