Autonomous objects: a natural model for complex applications
Journal of Intelligent Information Systems - Special issue on next generation information technologies
An overview of workflow management: from process modeling to workflow automation infrastructure
Distributed and Parallel Databases - Special issue on software support for work flow management
Role-Based Access Control Models
Computer
An object-oriented database architecture for providing security in cyberspace
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
An extended Petri net model for supporting workflow in a multilevel secure environment
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
Guarded commands, nondeterminacy and formal derivation of programs
Communications of the ACM
The Integration of Security and Integrity Constraints in MOKUM
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
An Execution Model for Multilevel Seccure Workflows
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Rules and Patterns for Security in Workflow Systems
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Analysing the Safety of Workflow Authorization Models
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Modelling, specifying and implementing workflow security in Cyberspace
Journal of Computer Security
Collaborative business and data privacy: toward a cyber-control?
Computers in Industry - Special issue: The digital factory: an instrument of the present and the future
Collaborative business and data privacy: Toward a cyber-control?
Computers in Industry - Special issue: The digital factory: an instrument of the present and the future
What agents can do in workflow management systems
Artificial Intelligence Review
Information and Software Technology
Hi-index | 0.00 |
Workflow management systems (WFMS) automate business processes where information flows between individuals. WFMS have two major implications for security: First, since the description of a workflow process explicitly states when which function is to be performed by whom, security specifications may be derived from such descriptions and translated into static role-based specifications. Second, since the WFMS is to be operated on the Web using web agents, dynamic and individual security rules must be enforced. AutoWF includes both types of security policies. AutoWF is implemented on top of a powerful software foundation--autonomous objects. Both general workflow management tasks and specific functional tasks are implemented as autonomous objects distributed over the Internet.This paper surveys some of the concepts on which the system is based, it then concentrates on the design and architectural issues of the AutoWF system, and finally we present some implementation examples.