1999
DOI: 10.1145/300830.300837
|View full text |Cite
|
Sign up to set email alerts
|

The specification and enforcement of authorization constraints in workflow management systems

Abstract: In recent years, workflow management systems (WFMSs) have gained popularity in both research and commercial sectors. WFMSs are used to coordinate and streamline business processes. Very large WFMSs are often used in organizations with users in the range of several thousands and process instances in the range of tens and thousands. To simplify the complexity of security administration, it is common practice in many businesses to allocate a role for each activity in the process and then assign one or more users … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
349
0
7

Year Published

2001
2001
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 450 publications
(356 citation statements)
references
References 10 publications
0
349
0
7
Order By: Relevance
“…Resource assignment languages (van der Aalst and ter Hofstede 2005; Cabanillas et al 2015b; Bertino, Ferrari, and Atluri 1999; Strembeck and Mendling 2011; Casati et al 1996; Scheer 2000; Du et al 1999; Tan, Crampton, and Gunter 2004; Cabanillas et al 2015a; Wolter and Schaad 2007; Awad et al 2009; Stroppi, Chiotti, and Villarreal 2011) serve the former purpose by enabling the definition of the conditions that the members of an organisation must meet in order to be allowed to participate in the activities of the processes executed in it, e.g., to belong to a specific department or to have certain skills. The outcome is a resource-aware process model .…”
Section: Related Workmentioning
confidence: 99%
“…Resource assignment languages (van der Aalst and ter Hofstede 2005; Cabanillas et al 2015b; Bertino, Ferrari, and Atluri 1999; Strembeck and Mendling 2011; Casati et al 1996; Scheer 2000; Du et al 1999; Tan, Crampton, and Gunter 2004; Cabanillas et al 2015a; Wolter and Schaad 2007; Awad et al 2009; Stroppi, Chiotti, and Villarreal 2011) serve the former purpose by enabling the definition of the conditions that the members of an organisation must meet in order to be allowed to participate in the activities of the processes executed in it, e.g., to belong to a specific department or to have certain skills. The outcome is a resource-aware process model .…”
Section: Related Workmentioning
confidence: 99%
“…A number of researchers have looked at the semantics of authorization, delegation, and revocation. Li et al proposed a logic for authorizing delegation in large-scale, open, distributed systems [3,10]. But in their logic, role-based concepts were not fully adopted; neither did they address revocation adequately.…”
Section: Related Workmentioning
confidence: 99%
“…Controlled access to its application services as well as to the application objects managed by them (e.g., business processes, documents, resources, or application systems) constitutes an important task for any information system (IS) [4,5,6,7,8]. This results in a large number of access rules covering different system aspects and user privileges [9].…”
Section: Problem Descriptionmentioning
confidence: 99%
“…In the literature numerous approaches have been presented dealing with challenging issues related to access control (e.g., [12,20,21,22]). Most of these approaches apply Role-Based Access Control (RBAC) models for defining and managing user privileges [6,23,20,24], e.g., to control the access to business documents and database objects, or to resolve the set of actors that qualify for a newly activated task in a workflow system [25,4,8,21,26,22].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation