共 26 条
- [11] Peng H.F., Huang Z.Q., Fan D.J., Zhang Y.L., Specification and verification of user privacy requirements for service composition, Ruan Jian Xue Bao/Journal of Software, 27, 8, pp. 1948-1963, (2016)
- [12] Bacon J., Eyers D., Pasquier T.F.J.M., Singh J., Papagiannis I., Pietzuch P., Information flow control for secure cloud computing, IEEE Trans. on Network and Service Management, 11, 1, pp. 76-89, (2014)
- [13] Nakajima S., Model-Checking of safety and security aspects in Web service flows, Proc. of the 4th Int'l Conf. on Web Engineering, pp. 488-501, (2004)
- [14] Denning D.E., A lattice model of secure information flow, Communications of the ACM, 19, 5, pp. 236-243, (1976)
- [15] Hutter D., Volkamer M., Information flow control to secure dynamic Web service composition, Proc. of the 3rd Int'l Conf. on Security in Pervasive Computing, pp. 196-210, (2006)
- [16] Accorsi R., Lehmann A., Lohmann N., Information leak detection in business process models: Theory, application, and tool support, Information Systems, 47, pp. 244-257, (2015)
- [17] Bell D.E., Lapadula L.J., Secure computer systems: Mathematical foundations, MITRE Technical Report, 2547, (1996)
- [18] Knorr K., Multilevel security and information flow in Petri net workflows, Proc. of the 9th Int'l Conf. on Telecommunication Systems-Modeling and Analysis, pp. 1-16, (2001)
- [19] Cranor L., Dobbs B., Egelman S., Hogben G., Humphrey J., Langheinrich M., Marchiori M., Presler-Marshall M., Reagle J., Schunter M., Stampley D.A., Wenning R., The Platform for Privacy Preferences 1.1 (P3P1.1) Specification. W3C, (2006)
- [20] Van Der Aalst W.M.P., Verification of workflow nets, Proc. of the 18th Int'l Conf. on Application and Theory of Petri Nets, pp. 407-426, (1997)