Role-Based Access Control Models
Computer
IEEE Transactions on Software Engineering - Special issue on formal methods in software practice
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
A Prototype Secure Workflow Server
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Tools to Support Secure Enterprise Computing
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Scalable access control for distributed object systems
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Models for coalition-based access control (CBAC)
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A secure workflow system for dynamic collaboration
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Meta-Policies for Distributed Role-Based Access Control Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
A composite rbac approach for large, complex organizations
Proceedings of the ninth ACM symposium on Access control models and technologies
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
Separation of duties for access control enforcement in workflow environments
IBM Systems Journal - End-to-end security
An Access Control Model for Web Services in Business Process
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
Role-based authorizations for workflow systems in support of task-based separation of duty
Journal of Systems and Software
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Chinese wall security for decentralized workflow management systems
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Preventing information leakage within workflows that execute among competing organizations
Journal of Systems and Software - Special issue: Software engineering education and training
DPE/PAC: decentralized process engine with product access control
Journal of Systems and Software
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
An algorithm for the appraisal of assurance indicators for complex business processes
Proceedings of the 2007 ACM workshop on Quality of protection
GPE4CGSP: interoperability between heterogeneous grid infrastructures
CHINA HPC '07 Proceedings of the 2007 Asian technology information program's (ATIP's) 3rd workshop on High performance computing in China: solution approaches to impediments for high performance computing
A Model-Driven Approach for the Specification and Analysis of Access Control Policies
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Consistency checking of role assignments in inter-organizational collaboration
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Security architecture for virtual organizations of business web services
Journal of Systems Architecture: the EUROMICRO Journal
Task-activity based access control for process collaboration environments
Computers in Industry
A Delegation Logic Based Authorization Mechanism for Virtual Organizations
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
RBAC for Organisation and Security in an Agent Coordination Infrastructure
Electronic Notes in Theoretical Computer Science (ENTCS)
A composite-service authorization prediction platform for grid environment
CDVE'07 Proceedings of the 4th international conference on Cooperative design, visualization, and engineering
Resource management with X.509 inter-domain authorization certificates (InterAC)
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
RTME: extension of role-task modeling for the purpose of access control specification
HCSE'10 Proceedings of the Third international conference on Human-centred software engineering
From business process choreography to authorization policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Internet-Based e-learning workflow process
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
Trust-Based secure workflow path construction
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
Trusted identity and session management using secure cookies
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
Optimistic anonymous participation in inter-organizational workflow instances
ICISS'06 Proceedings of the Second international conference on Information Systems Security
On the Prevention of Fraud and Privacy Exposure in Process Information Flow
INFORMS Journal on Computing
Complexity of the soundness problem of bounded workflow nets
PETRI NETS'12 Proceedings of the 33rd international conference on Application and Theory of Petri Nets
Recognition of authority in virtual organisations
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Satisfiability and resiliency in workflow systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Traceability and integrity of execution in distributed workflow management systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Information Systems and e-Business Management
Supporting Secure Information Flow: An Engineering Approach
International Journal of e-Collaboration
Information and Software Technology
Behavior-based access control for distributed healthcare systems
Journal of Computer Security
Complexity of the Soundness Problem of Workflow Nets
Fundamenta Informaticae - Application and Theory of Petri Nets and Concurrency, 2012
Hi-index | 0.00 |
As more businesses engage in globalization, inter-organizational collaborative computing grows in importance. Since we cannot expect homogeneous computing environments in participating organizations, heterogeneity and Internet-based technology are prevalent in inter-organizational collaborative computing environments. One technology that provides solutions for data sharing and work coordination at the global level is inter-organizational workflow. In this paper, we investigate the access control requirements for inter-organizational workflow. We then present access control solutions for inter-organizational workflow based on our implementation. Many of the requirements and solutions in this paper address the scalability of existing security solutions, the separation of inter-organizational workflow security from concrete organization level security enforcement, and the enforcement of fine-grained access control for inter-organizational workflow.