Exceptions and exception handling in computerized information processes
ACM Transactions on Information Systems (TOIS)
Role-Based Access Control Models
Computer
Adept_flex—Supporting Dynamic Changes of Workflows Without Losing Control
Journal of Intelligent Information Systems - Special issue on workflow management systems
Data & Knowledge Engineering - Special issue on ER '96
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Enforcing mandatory and discretionary security in workflow management systems
Journal of Computer Security - Special issue on database security
Inheritance of workflows: an approach to tackling problems related to change
Theoretical Computer Science
Exception Handling in Workflow Systems
Applied Intelligence
Managing Workflow Authorization Constraints through Active Database Technology
Information Systems Frontiers
Pockets of Flexibility in Workflow Specification
ER '01 Proceedings of the 20th International Conference on Conceptual Modeling: Conceptual Modeling
Role-Based Access Control
Correctness criteria for dynamic changes in workflow systems: a survey
Data & Knowledge Engineering - Special issue: Advances in business process management
Role-based authorizations for workflow systems in support of task-based separation of duty
Journal of Systems and Software
Case handling: a new paradigm for business process support
Data & Knowledge Engineering
CCBR–Driven business process evolution
ICCBR'05 Proceedings of the 6th international conference on Case-Based Reasoning Research and Development
Integrating process learning and process evolution – a semantics based approach
BPM'05 Proceedings of the 3rd international conference on Business Process Management
Towards a framework for the agile mining of business processes
BPM'05 Proceedings of the Third international conference on Business Process Management
Data & Knowledge Engineering
Security Challenges in Adaptive e-Health Processes
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
A security policy framework for context-aware and user preferences in e-services
Journal of Systems Architecture: the EUROMICRO Journal
Flexibility in Process-Aware Information Systems
Transactions on Petri Nets and Other Models of Concurrency II
Comprehensive life cycle support for access rules in information systems: the CEOSIS project
Enterprise Information Systems - Towards Model-driven Service-oriented Enterprise Computing - 12th International IEEE EDOC Enterprise Computing Conference (EDOC 2008)
A formal framework for adaptive access control models
Journal on data semantics IX
What BPM technology can do for healthcare process support
AIME'11 Proceedings of the 13th conference on Artificial intelligence in medicine
On the controlled evolution of access rules in cooperative information systems
OTM'05 Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I
Mining staff assignment rules from event-based data
BPM'05 Proceedings of the Third international conference on Business Process Management
Enforcement of entailment constraints in distributed service-based business processes
Information and Software Technology
Information and Software Technology
Hi-index | 0.00 |
Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to this need adaptive process management systems (PMS) have emerged, supporting both ad-hoc deviations from the predefined process schema and the quick adaptation of the PAIS to business process changes. This newly gained runtime flexibility, however, imposes challenging security issues as the PMS becomes more vulnerable to misuse. Process changes must be restricted to authorized users, but without nullifying the advantages of a flexible system by handling authorizations in a too rigid way. This paper discusses requirements relevant in this context and proposes a comprehensive access control (AC) model with special focus on adaptive PMS. On the one hand, our approach allows the compact definition of user dependent access rights restricting process changes to authorized users only. On the other hand, the definition of process type dependent access rights is supported to only allow for those change commands which are applicable within a particular process context. Respective AC mechanisms will be key ingredients in future adaptive PMS.