[HTML][HTML] A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions

M Leitner, S Rinderle-Ma - Information and Software Technology, 2014 - Elsevier
Abstract Context Security in Process-Aware Information Systems (PAIS) has gained
increased attention in current research and practice. However, a common understanding …

A survey of autonomic communications

S Dobson, S Denazis, A Fernández, D Gaïti… - ACM Transactions on …, 2006 - dl.acm.org
Autonomic communications seek to improve the ability of network and services to cope with
unpredicted change, including changes in topology, load, task, the physical and logical …

Security for workflow systems

V Atluri, J Warner - Handbook of database security: applications and …, 2008 - Springer
Workflow technology is often employed by organizations to automate their day-to-day
business processes. The primary advantage of adopting workflow technology is to separate …

[PDF][PDF] Enabling resource assignment constraints in BPMN

A Awad, A Grosskopf, A Meyer… - Hasso Plattner Institute …, 2009 - academia.edu
Due to the critical role humans play in automated business processes, a BPEL extension
has been recently released BPEL4People and WS-HumanTask to express issues like …

A survey on trust-based web service provision approaches

N Dragoni - 2010 Third International Conference on …, 2010 - ieeexplore.ieee.org
The basic tenet of Service-Oriented Computing (SOC) is the possibility of building distributed
applications on the Web by using Web Services as fundamental building blocks. The …

Trustbuilder2: A reconfigurable framework for trust negotiation

AJ Lee, M Winslett, KJ Perano - Trust Management III: Third IFIP WG 11.11 …, 2009 - Springer
To date, research in trust negotiation has focused mainly on the theoretical aspects of the
trust negotiation process, and the development of proof of concept implementations. These …

Enforcing safety and consistency constraints in policy-based authorization systems

AJ Lee, M Winslett - ACM Transactions on Information and System …, 2008 - dl.acm.org
In trust negotiation and other forms of distributed proving, networked entities cooperate to
form proofs of authorization that are justified by collections of certified attribute credentials …

Toward trustworthy web services-approaches, weaknesses and trust-by-contract framework

N Dragoni - 2009 IEEE/WIC/ACM International Joint …, 2009 - ieeexplore.ieee.org
The Service-Oriented Computing (SOC) paradigm envisions a large, open and dynamic
computing environment where anyone can publish his own services, for instance on the …

The role of abduction in declarative authorization policies

MY Becker, S Nanz - Practical Aspects of Declarative Languages: 10th …, 2008 - Springer
Declarative authorization languages promise to simplify the administration of access control
systems by allowing the authorization policy to be factored out of the implementation of the …

Specifying separation of duty constraints in bpel4people processes

J Mendling, K Ploesser, M Strembeck - International Conference on …, 2008 - Springer
Security issues have to be carefully considered for information systems that support the
business processes of an organization, in particular, when these systems build on open …