Developing legal knowledge based systems using decision tables
ICAIL '93 Proceedings of the 4th international conference on Artificial intelligence and law
Handbook of logic in artificial intelligence and logic programming (vol. 3)
Role-Based Access Control Models
Computer
An illustration of verification and validation in the modelling phase of KBS development
Data & Knowledge Engineering
A declarative approach to business rules in contracts: courteous logic programs in XML
Proceedings of the 1st ACM conference on Electronic commerce
Representation results for defeasible logic
ACM Transactions on Computational Logic (TOCL)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Visualizing defeasible logic rules for the semantic web
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
A visual environment for developing defeasible rule bases for the semantic web
RuleML'05 Proceedings of the First international conference on Rules and Rule Markup Languages for the Semantic Web
A Rule-Based Framework Using Role Patterns for Business Process Compliance
RuleML '08 Proceedings of the International Symposium on Rule Representation, Interchange and Reasoning on the Web
RuleML '08 Proceedings of the International Symposium on Rule Representation, Interchange and Reasoning on the Web
Process Materialization Using Templates and Rules to Design Flexible Process Models
RuleML '09 Proceedings of the 2009 International Symposium on Rule Interchange and Applications
Declarative process modeling with business vocabulary and business rules
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems - Volume Part I
Conceptual model for online auditing
Decision Support Systems
Defining access control rules with conditions
RuleML'10 Proceedings of the 2010 international conference on Semantic web rules
Process discovery in event logs: An application in the telecom industry
Applied Soft Computing
A transformation from SBVR business rules into event coordinated rules by means of SBVR patterns
ServiceWave'10 Proceedings of the 2010 international conference on Towards a service-based internet
On the relation between decision structures, tables and processes
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems
Design and management of flexible process variants using templates and rules
Computers in Industry
Context-Aware compliance checking
BPM'12 Proceedings of the 10th international conference on Business Process Management
Hi-index | 0.00 |
Access control is an important aspect of regulatory compliance. Therefore, access control specifications must be process-aware in that they can refer to an underlying business process context, but do not specify when and how they must be enforced. Such access control specifications are often expressed in terms of general rules and exceptions, akin to defeasible logic. In this paper we demonstrate how a role-based, process-aware access control policy can be specified in the SBVR. In particular, we define an SBVR vocabulary that allows for a process-aware specification of defeasible access control rules. Because SBVR does not support defeasible rules, we show how a set of defeasible access control rules can be transformed into ordinary SBVR access control rules using decision tables as a transformation mechanism.