Author:
Cuppens Frédéric,Cuppens-Boulahia Nora
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference47 articles.
1. Adam N., Atluri V. and Huang W.-K. (1998). Modeling and analysis of workflows using petri nets. J Int. Inf. Syst. 10(2): 131–158
2. Ahn G.-J. and Sandhu R. (2000). Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207–226
3. Ahn, G.-J., Shin, M.E.: Role-based authorization constraints specification using object constraint language. In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), MA, USA, (2001)
4. Al-Kahtani, M.A., Sandhu, R.: A model for attribute-based uSer-role assignment. In: 18th Annual Computer Security Applications Conference (ACSAC’02), Las Vegas, Nevada, December 2002
5. Atluri, V., Huang, W.-K.: An authorization model for workflows. In: ESORICS’96, vol. 1146. LNCS (1996)
Cited by
90 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献