2011 IEEE International Conference on Services Computing 2011
DOI: 10.1109/scc.2011.56
|View full text |Cite
|
Sign up to set email alerts
|

Modelling Workflow Executions under Role-Based Authorisation Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Some of this research also uses Petri-nets to model authorization constraints. The work presented in this paper differs from this research in the following respects: First, the work found in the literature [26] does not differentiate human tasks and computing tasks, and does not model the interactions between workflow authorization and workflow execution. The work presented in this paper models resource competition and interactions between the authorization module and the execution module.…”
Section: Related Workmentioning
confidence: 90%
See 2 more Smart Citations
“…Some of this research also uses Petri-nets to model authorization constraints. The work presented in this paper differs from this research in the following respects: First, the work found in the literature [26] does not differentiate human tasks and computing tasks, and does not model the interactions between workflow authorization and workflow execution. The work presented in this paper models resource competition and interactions between the authorization module and the execution module.…”
Section: Related Workmentioning
confidence: 90%
“…Research has also been conducted on the topic of security and authorization constraints in the workflow context [25,14,[26][27][28]16]. Some of this research also uses Petri-nets to model authorization constraints.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Other efforts are made to transform the SOA models into other executable models like discreteevent models (e.g. Symbolic Transition System (Ardagna, 2013), Petri Net (He, 2011) or its variants). Unfortunately, the transformed models including a lot of "places/states" and "transactions" which gives an appearance completely different from the original system architecture, hence this kind of simulation can't provide an intuitive observation of systems' behavior and interactions between services.…”
Section: Introductionmentioning
confidence: 99%