Dynamic and risk-aware network access management
Proceedings of the eighth ACM symposium on Access control models and technologies
Security Analysis of Electronic Business Processes
Electronic Commerce Research
Preventing information leakage within workflows that execute among competing organizations
Journal of Systems and Software - Special issue: Software engineering education and training
DPE/PAC: decentralized process engine with product access control
Journal of Systems and Software
Authorization Policy Based Business Collaboration Reliability Verification
ICSOC '08 Proceedings of the 6th International Conference on Service-Oriented Computing
Security architecture for virtual organizations of business web services
Journal of Systems Architecture: the EUROMICRO Journal
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools
Transactions on Computational Science IV
Component-based security policy design with colored Petri nets
Semantics and algebraic specification
From business process choreography to authorization policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Trust-Based secure workflow path construction
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
Optimistic anonymous participation in inter-organizational workflow instances
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Modeling TCG-Based secure systems with colored petri nets
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Using timed colored petri nets and CPN-tool to model and verify TRBAC security policies
VECoS'10 Proceedings of the Fourth international conference on Verification and Evaluation of Computer and Communication Systems
Secure interoperation design in multi-domains environments based on colored Petri nets
Information Sciences: an International Journal
Association-Based Active Access Control models with balanced scalability and flexibility
Computers in Industry
Dynamic policy adaptation for inference control of queries to a propositional information system
Journal of Computer Security - DBSec 2011
Automatic security assessment for next generation wireless mobile networks
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are static they rarely change over time. This paper shows how to make access control matrices dynamic by means of workflows. Access rights are granted according to the state of the workflow. By this practice the risk of data misuse is decreased which is proven through an equation given in the paper. The concept of workflow is defined by Petri nets which offer a solid mathematical foundation and are well suited to represent discrete models such as workflows.