Petri nets: an introduction
Computers and Security
Managing business processes as an information resource
IBM Systems Journal
Policy resolution in workflow management systems
Digital Technical Journal
An overview of workflow management: from process modeling to workflow automation infrastructure
Distributed and Parallel Databases - Special issue on software support for work flow management
Coloured Petri nets (2nd ed.): basic concepts, analysis methods and practical use: volume 1
Coloured Petri nets (2nd ed.): basic concepts, analysis methods and practical use: volume 1
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
The RSL99 language for role-based separation of duty constraints
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
SecureFlow: a secure Web-enabled workflow management system
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Workflow and Process Automation: Concepts and Technology
Workflow and Process Automation: Concepts and Technology
A Formal Foundation for Distributed Workflow Execution Based on State Charts
ICDT '97 Proceedings of the 6th International Conference on Database Theory
Analyzing Separation of Duties in Petri Net Workflows
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Modeling and Analyzing of Workflow Authorization Management
Journal of Network and Systems Management
On mutually exclusive roles and separation-of-duty
ACM Transactions on Information and System Security (TISSEC)
Task-based entailment constraints for basic workflow patterns
Proceedings of the 13th ACM symposium on Access control models and technologies
Modeling of task-based authorization constraints in BPMN
BPM'07 Proceedings of the 5th international conference on Business process management
Hi-index | 0.00 |
There is a scale between authentication and anonymity, which is currently leaning towards the side of authentication, when it comes to e-commerce. Service providers and merchants are usually keeping track of user-related information in order to construct ...