Computer security reference book
Computer security reference book
Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
A comprehensive approach to flexibility in workflow management systems
WACC '99 Proceedings of the international joint conference on Work activities coordination and collaboration
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Injecting RBAC to secure a Web-based workflow system
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
On building workflow models for flexible processes
ADC '02 Proceedings of the 13th Australasian database conference - Volume 5
Flexible Workflow Management in the OPENflow System
EDOC '01 Proceedings of the 5th IEEE International Conference on Enterprise Distributed Object Computing
An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Dependencies and separation of duty constraints in GTRBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
Tucupi: a flexible workflow system based on overridable constraints
Proceedings of the 2004 ACM symposium on Applied computing
Organizational Management in Workflow Applications – Issues and Perspectives
Information Technology and Management
Specification and enforcement of flexible security policy for active cooperation
Information Sciences: an International Journal
Injecting a permission-based delegation model to secure web-based workflow systems
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Integrating constraints to support legally flexible business processes
Information Systems Frontiers
An approach for implementation of RBAC models with context constraint to business process systems
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
An approach for trusted interoperation in a multidomain environment
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Optimistic anonymous participation in inter-organizational workflow instances
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Ontology based hybrid access control for automatic interoperation
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
Web-based workflow can be used to facilitate enterprise business process while the security and flexibility are two of the most important aspects in electronic business system. RBAC is regarded as a neutral policy and has been the most popular secure model in recent years. The flexible RBAC workflow model (FRWM) has been proposed recently. It has encapsulated RBAC and workflow together considering both security and flexibility features. In this paper the enforcement of FRWM is introduced. We also present the design and implementation of a practical system for Property Right Exchange (PRES) based on FRWM, in which the flexibility of workflow can be reached through definition and execution while considering the security with RBAC.