Role-Based Access Control Models
Computer
Adept_flex—Supporting Dynamic Changes of Workflows Without Losing Control
Journal of Intelligent Information Systems - Special issue on workflow management systems
A meta modelng approach to workflow management systems supporting exception handling
Information Systems - Special issue on meta-modelling and methodology engineering
Specification and implementation of exceptions in workflow management systems
ACM Transactions on Database Systems (TODS)
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Task-role-based access control model
Information Systems
The Consistency of Task-Based Authorization Constraints in Workflow Systems
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
How to Break Access Control in a Controlled Manner
CBMS '06 Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Deadline-based escalation in process-aware information systems
Decision Support Systems
A Survey on the Flexibility Requirements Related to Business Processes and Modeling Artifacts
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Delegation and satisfiability in workflow systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Task-based entailment constraints for basic workflow patterns
Proceedings of the 13th ACM symposium on Access control models and technologies
Flexibility in Process-Aware Information Systems
Transactions on Petri Nets and Other Models of Concurrency II
Extending access control models with break-glass
Proceedings of the 14th ACM symposium on Access control models and technologies
How to Securely Break into RBAC: The BTG-RBAC Model
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Scenario-Driven Role Engineering
IEEE Security and Privacy
Change patterns and change support features in process-aware information systems
CAiSE'07 Proceedings of the 19th international conference on Advanced information systems engineering
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Modeling process-related RBAC models with extended UML activity models
Information and Software Technology
Rumpole: a flexible break-glass access control model
Proceedings of the 16th ACM symposium on Access control models and technologies
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Towards a mechanism for discretionary overriding of access control
SP'04 Proceedings of the 12th international conference on Security Protocols
Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments
MUSIC '12 Proceedings of the 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing
Hi-index | 0.00 |
We present a break-glass extension for process-related role-based access control (RBAC) models. Our extension ensures the static (design-time) and dynamic (runtime) consistency of corresponding break-glass models. The extension is generic in the sense that it can, in principle, be used to extend arbitrary process-aware information systems or process modeling languages with support for process-related RBAC and corresponding break-glass policies. We implemented a library and runtime engine that provides full platform support for all properties of our approach.