Foundations of logic programming
Foundations of logic programming
Reasoning about change: time and causation from the standpoint of artificial intelligence
Reasoning about change: time and causation from the standpoint of artificial intelligence
Specification and execution of transactional workflows
Modern database systems
An overview of workflow management: from process modeling to workflow automation infrastructure
Distributed and Parallel Databases - Special issue on software support for work flow management
Modeling and Analysis of Workflows Using Petri Nets
Journal of Intelligent Information Systems - Special issue on workflow management systems
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
On an algebra for historical relational databases: two views
SIGMOD '85 Proceedings of the 1985 ACM SIGMOD international conference on Management of data
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
A role-based delegation framework for healthcare information systems
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A Visual Language for Authorization Modeling
VL '97 Proceedings of the 1997 IEEE Symposium on Visual Languages (VL '97)
A Practically Implementable and Tractable Delegation Logic
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Agency interoperation for effective data mining in border control and homeland security applications
dg.o '05 Proceedings of the 2005 national conference on Digital government research
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Proceedings of the eleventh ACM symposium on Access control models and technologies
Delegation in the role graph model
Proceedings of the eleventh ACM symposium on Access control models and technologies
On delegation and workflow execution models
Proceedings of the 2008 ACM symposium on Applied computing
Delegation and satisfiability in workflow systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Beyond separation of duty: An algebra for specifying high-level security policies
Journal of the ACM (JACM)
Commitment issues in delegation process
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
On the Security of Delegation in Access Control Systems
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Law-aware access control for international financial environments
Proceedings of the Eighth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Graph-based delegation authorization in workflow
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Collaboration for human-centric eGovernment workflows
WISE'07 Proceedings of the 2007 international conference on Web information systems engineering
Capability-based delegation model in RBAC
Proceedings of the 15th ACM symposium on Access control models and technologies
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Dynamic authorisation policies for event-based task delegation
CAiSE'10 Proceedings of the 22nd international conference on Advanced information systems engineering
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Proceedings of the 16th ACM symposium on Access control models and technologies
A model for constraint and delegation management
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Correcting a delegation protocol for grids
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Journal of Computer and System Sciences
Model checking of security-sensitive business processes
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Modeling and analyzing the impact of authorization on workflow executions
Future Generation Computer Systems
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL
Information and Software Technology
Satisfiability and resiliency in workflow systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Information Systems and e-Business Management
Hi-index | 0.00 |
Workflows model and control the execution of business processes in an organization. A workflow typically comprises of a set of coordinated activities, known as tasks. Typically, organizations establish a set of security policies, that regulate how the business process and resources should be managed. While a simple policy may specify which user (or role) can be assigned to execute a task, a complex policy may specify authorization constraints, such as separation of duties. Users may delegate the tasks assigned to them. Often such delegations are short-lived and come into play when certain conditions are satisfied. For example, a user may want to delegate his task of check approval only when going on vacation, when a check amount is less than a certain amount, or when his workload exceeds a certain limit.In this paper, we extend the notion of delegation to allow for such conditional delegation, where the delegation conditions can be based on time, workload and task attributes. When workflow systems entertain conditional delegation, different types of constraints come into play, which include authorization constraints, role activation constraints and workflow dependency requirements. We address the problem of assigning users to tasks in a consistent manner such that none of the constraints are violated.