咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 8 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学

主题

  • 10 篇 authorization co...
  • 3 篇 role-based acces...
  • 2 篇 access control
  • 2 篇 security
  • 1 篇 languages
  • 1 篇 workflows
  • 1 篇 role-based acces...
  • 1 篇 business process
  • 1 篇 kernelization
  • 1 篇 role and user pl...
  • 1 篇 workflow satisfi...
  • 1 篇 algorithms
  • 1 篇 linear temporal ...
  • 1 篇 inter-organizati...
  • 1 篇 active databases
  • 1 篇 optimization
  • 1 篇 petri nets
  • 1 篇 monitoring
  • 1 篇 roles
  • 1 篇 access control m...

机构

  • 1 篇 college of infor...
  • 1 篇 univ london dept...
  • 1 篇 politecn milan d...
  • 1 篇 univ. di milano ...
  • 1 篇 univ johannesbur...
  • 1 篇 information and ...
  • 1 篇 arizona state un...
  • 1 篇 mohammed v univ ...
  • 1 篇 xidian univ sch ...
  • 1 篇 univ tecn lisboa...
  • 1 篇 xi an jiao tong ...
  • 1 篇 univ warwick dep...
  • 1 篇 rutgers univ. ne...
  • 1 篇 univ milan dipar...
  • 1 篇 univ lisbon fac ...
  • 1 篇 univ london dept...
  • 1 篇 hunan univ sch i...
  • 1 篇 hewlett packard ...
  • 1 篇 mohammed v univ ...
  • 1 篇 purdue univ w la...

作者

  • 2 篇 crampton jason
  • 2 篇 ahn gail-joon
  • 1 篇 li kenli
  • 1 篇 chang cheng
  • 1 篇 he ligang
  • 1 篇 hanan el bakkali
  • 1 篇 paci federica
  • 1 篇 sun jianhua
  • 1 篇 bertino elisa
  • 1 篇 chen hao
  • 1 篇 yeo anders
  • 1 篇 yang benyuan
  • 1 篇 elena ferrari
  • 1 篇 gutin gregory
  • 1 篇 elisa bertino
  • 1 篇 gogolla martin
  • 1 篇 fugini mg
  • 1 篇 hu hesuan
  • 1 篇 martinho ricardo
  • 1 篇 drouineaud micha...

语言

  • 9 篇 英文
  • 1 篇 其他
检索条件"主题词=authorization constraints"
10 条 记 录,以下是1-10 订阅
排序:
Analysis of authorization constraints via Integer Linear Programming
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2023年 第3期35卷 2258-2271页
作者: Yang, Benyuan Hu, Hesuan Xidian Univ Sch Electromech Engn Xian 710071 Shaanxi Peoples R China Nanyang Technol Univ Coll Engn Sch Comp Sci & Engn Singapore 639798 Singapore Xi An Jiao Tong Univ State Key Lab Mfg Syst Engn Xian 710054 Shaanxi Peoples R China
This paper focuses on constraint verification and violation resolution for Petri nets (PNs) modeling of role-based access control (RBAC) policy. Checking the satisfiability of authorization constraints imposes a major... 详细信息
来源: 评论
Managing workflow authorization constraints through active database technology
收藏 引用
INFORMATION SYSTEMS FRONTIERS 2001年 第3期3卷 319-338页
作者: Casati, F Castano, S Fugini, MG Hewlett Packard Labs Palo Alto CA 94304 USA Univ Milan Dipartimento Sci Informaz I-20135 Milan Italy Politecn Milan Dipartimento Elettron & Informaz I-20133 Milan Italy
The execution of workflow processes requires authorizations for enforcing the assignment of tasks to agents. either human or automated, according to the security policy of the organization. This paper presents a workf... 详细信息
来源: 评论
Performance Analysis and Optimization for Stochastic Workflows Running Under authorization constraints  17
Performance Analysis and Optimization for Stochastic Workflo...
收藏 引用
IEEE 17th International Conference on Computational Science and Engineering (CSE)
作者: Chang, Cheng He, Ligang Chen, Hao Sun, Jianhua Li, Kenli Hunan Univ Sch Informat Sci & Engn Changsha 410082 Hunan Peoples R China Univ Warwick Dept Comp Sci Coventry CV4 7AL W Midlands England
Business processes or workflows are often used to model enterprise applications. In the supporting platform for running enterprise applications, authorization policies, such as temporal constraints and role constraint... 详细信息
来源: 评论
Role-Based authorization constraints Specification
收藏 引用
ACM Transactions on Information and System Security 2000年 第4期3.0卷 207-226页
作者: Ahn, Gail-Joon Sandhu, Ravi College of Information Technology University of North Carolina at Charlotte Charlotte NC 28223-0001 9201 University City Blvd. United States Information and Software Engineering Department George Mason University Fairfax VA 22030 Mail Stop 4A4 United States
constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principal motivations behind RBAC. Although the importance of constraints in RBAC has been recognized for a ... 详细信息
来源: 评论
The specification and enforcement of authorization constraints in workflow management systems
收藏 引用
ACM Transactions on Information and System Security 1999年 第1期2卷 65–104页
作者: Elisa Bertino Elena Ferrari Vijay Atluri Univ. di Milano Milan Italy Rutgers Univ. Newark NJ
In recent years, workflow management systems (WFMSs) have gained popularity in both research and commercial sectors. WFMSs are used to coordinate and streamline business processes. Very large WFMSs are often used in o... 详细信息
来源: 评论
Analyzing and managing role-based access control policies
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2008年 第7期20卷 924-939页
作者: Sohr, Karsten Drouineaud, Michael Ahn, Gail-Joon Gogolla, Martin Univ Bremen Ctr Comp Technol D-28359 Bremen Germany Arizona State Univ Dept Comp Sci & Engn Ira A Fulton Sch Engn Tempe AZ 85281 USA
Today, more and more sensitive data is stored on computer systems;security-critical business processes are mapped to their digital counterparts. This situation applies to institutes that have different security requir... 详细信息
来源: 评论
An access-control framework for WS-BPEL
收藏 引用
INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH 2008年 第3期5卷 20-43页
作者: Paci, Federica Bertino, Elisa Crampton, Jason Purdue Univ W Lafayette IN 47907 USA Univ London London WC1E 7HU England
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been proposed for specifying and orchestrating bus... 详细信息
来源: 评论
Supporting authentication requirements in workflows
Supporting authentication requirements in workflows
收藏 引用
8th International Conference on Enterprise Information Systems (ICEIS 2006)
作者: Martinho, Ricardo Domingos, Dulce Rito-Silva, Antonio Polytech Inst Leiria Sch Technol & Management P-2411901 Leiria Portugal Univ Lisbon Fac Sci P-1749016 Lisbon Portugal Univ Tecn Lisboa INESC ID Software Engn Grp P-1000029 Lisbon Portugal
Workflow technology represents nowadays significant added value to organizations that use information systems to support their business processes. By their nature, workflows support the integration of different inform... 详细信息
来源: 评论
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem
收藏 引用
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2013年 第1期16卷 4-4页
作者: Crampton, Jason Gutin, Gregory Yeo, Anders Univ London Dept Math London WC1E 7HU England Univ London Dept Comp Sci London WC1E 7HU England Univ Johannesburg Dept Math Johannesburg South Africa
A workflow specification defines a set of steps and the order in which these steps must be executed. Security requirements may impose constraints on which groups of users are permitted to perform subsets of these step... 详细信息
来源: 评论
A resilient inter-organizational workflow assignment plan selection approach: Application to a digital health use case
收藏 引用
INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT 2024年 16卷
作者: Monsef, Boughrous Hanan, El Bakkali Mohammed V Univ Rabat Rabat IT Ctr Smart Syst Lab SSL ENSIAS Rabat Morocco Mohammed V Univ Rabat Rabat IT Ctr Smart Syst Lab SSL ENSIAS Rabat 10000 Morocco
Workflow Management Systems are rapidly evolving and increasingly used in a variety of industries, allowing organizations to automate and enhance their business processes. Hence, they are open to collaboration throw i... 详细信息
来源: 评论