2009 International Conference on Availability, Reliability and Security 2009
DOI: 10.1109/ares.2009.152
|View full text |Cite
|
Sign up to set email alerts
|

Deploying Security Policy in Intra and Inter Workflow Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2012
2012
2015
2015

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 4 publications
0
11
0
1
Order By: Relevance
“…It covers a lot of issues such as conflict detection [14] or interoperability and deployment in companies Workflows [15]. In [16], OrBAC has been enhance to tackle information flow control problematic.…”
Section: Unifying Ac and Tcmentioning
confidence: 99%
See 1 more Smart Citation
“…It covers a lot of issues such as conflict detection [14] or interoperability and deployment in companies Workflows [15]. In [16], OrBAC has been enhance to tackle information flow control problematic.…”
Section: Unifying Ac and Tcmentioning
confidence: 99%
“…A target can be formalized as an entity and an element (14). An entity can be a sender, a receiver, an action of the sender, an action of the receiver or a resource (15). An element can be an entity identifier (ex: "John"), a parameter key (ex: "role"), or a parameter value (ex: "manager") (16).…”
Section: Mapping Rules Syntaxmentioning
confidence: 99%
“…In particular, they assume fail-save participants and processes, reliable communication, as well as a centralized workflow coordinator. Ayed et al [1] discuss the deployment of workflow security policies for inter-organizational workflow. However, the approach also assumes fail-save hard-and software.…”
Section: Related Workmentioning
confidence: 99%
“…Our runtime engine ensures the consistency of business processes with corresponding entailment constraints at the type-level (design-time) and at the instance-level (runtime). The source code of our implementation is available for download 1 . However, the deployment of such a process engine in a distributed system raises a number of challenges.…”
Section: Motivationmentioning
confidence: 99%
“…In this context, work in the area of access control enforcement in workflow management [34] [35] and Model-Driven Security [36][37], though important, suffer from enforcing security policies only at run-time and not during the workflow formation.…”
Section: Related Workmentioning
confidence: 99%