[HTML][HTML] A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions
M Leitner, S Rinderle-Ma - Information and Software Technology, 2014 - Elsevier
Abstract Context Security in Process-Aware Information Systems (PAIS) has gained
increased attention in current research and practice. However, a common understanding …
increased attention in current research and practice. However, a common understanding …
A survey of autonomic communications
Autonomic communications seek to improve the ability of network and services to cope with
unpredicted change, including changes in topology, load, task, the physical and logical …
unpredicted change, including changes in topology, load, task, the physical and logical …
Security for workflow systems
V Atluri, J Warner - Handbook of database security: applications and …, 2008 - Springer
Workflow technology is often employed by organizations to automate their day-to-day
business processes. The primary advantage of adopting workflow technology is to separate …
business processes. The primary advantage of adopting workflow technology is to separate …
[PDF][PDF] Enabling resource assignment constraints in BPMN
A Awad, A Grosskopf, A Meyer… - Hasso Plattner Institute …, 2009 - academia.edu
Due to the critical role humans play in automated business processes, a BPEL extension
has been recently released BPEL4People and WS-HumanTask to express issues like …
has been recently released BPEL4People and WS-HumanTask to express issues like …
A survey on trust-based web service provision approaches
N Dragoni - 2010 Third International Conference on …, 2010 - ieeexplore.ieee.org
The basic tenet of Service-Oriented Computing (SOC) is the possibility of building distributed
applications on the Web by using Web Services as fundamental building blocks. The …
applications on the Web by using Web Services as fundamental building blocks. The …
Trustbuilder2: A reconfigurable framework for trust negotiation
AJ Lee, M Winslett, KJ Perano - Trust Management III: Third IFIP WG 11.11 …, 2009 - Springer
To date, research in trust negotiation has focused mainly on the theoretical aspects of the
trust negotiation process, and the development of proof of concept implementations. These …
trust negotiation process, and the development of proof of concept implementations. These …
Enforcing safety and consistency constraints in policy-based authorization systems
AJ Lee, M Winslett - ACM Transactions on Information and System …, 2008 - dl.acm.org
In trust negotiation and other forms of distributed proving, networked entities cooperate to
form proofs of authorization that are justified by collections of certified attribute credentials …
form proofs of authorization that are justified by collections of certified attribute credentials …
Toward trustworthy web services-approaches, weaknesses and trust-by-contract framework
N Dragoni - 2009 IEEE/WIC/ACM International Joint …, 2009 - ieeexplore.ieee.org
The Service-Oriented Computing (SOC) paradigm envisions a large, open and dynamic
computing environment where anyone can publish his own services, for instance on the …
computing environment where anyone can publish his own services, for instance on the …
The role of abduction in declarative authorization policies
MY Becker, S Nanz - Practical Aspects of Declarative Languages: 10th …, 2008 - Springer
Declarative authorization languages promise to simplify the administration of access control
systems by allowing the authorization policy to be factored out of the implementation of the …
systems by allowing the authorization policy to be factored out of the implementation of the …
Specifying separation of duty constraints in bpel4people processes
J Mendling, K Ploesser, M Strembeck - International Conference on …, 2008 - Springer
Security issues have to be carefully considered for information systems that support the
business processes of an organization, in particular, when these systems build on open …
business processes of an organization, in particular, when these systems build on open …