Author:
Yi Zhang,Yong Zhang,Weinong Wang
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference21 articles.
1. D. Georgakopoulos, M. Hornick, and A. Sheth, Overview of workflow management: From process modeling to workflow automation infrastructure, Distributed and Parallel Database, pp. 119?153, 1995.
2. P. Samarati and S. Vinmercati, Access Control: Policies, Models, and Mechanisms, Springer, Berlin, Heidelberg, FOSAD 2000, LNCS 2171, pp. 137?196, 2001.
3. V. Atluri and W-K. Huang, An Authorization model for workflows, Proceedings of the Fifth European Symposium on Research in Computer Security, pp. 44?64, September 1996.
4. R. S. Sandhu, E. J. Coyne, H. L. Fenstein, and C. E. Youman, Role-based access control models, IEEE Computer, Vol. 29, No. 2, pp. 38?47, February 1996.
5. D. D. Clark and D. R. Wilson, A comparison of commercial and military computer security policies, Proceedings of IEEE Symposium on Security and Privacy pp. 184?194, April 1987.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献