共 50 条
- [1] Verification of Access Control Policies for REA Business Processes 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1095 - 1100
- [2] Eliciting Security Requirements for Business Processes of Legacy Systems PRACTICE OF ENTERPRISE MODELING, POEM 2015, 2015, 235 : 91 - 107
- [4] ACCESS CONTROL MODELS FOR BUSINESS PROCESSES SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 489 - 498
- [5] Idea to Derive Security Policies from Collaborative Business Processes 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, : 243 - 246
- [6] Security Analysis of Access Control Policies for Smart Homes PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 99 - 106
- [7] Access Control Model for Collaborative Business Processes ENGINEERING THE USER INTERFACE: FROM RESEARCH TO PRACTICE, 2009, : 117 - +
- [8] Architecting Access Control for Business Processes in the Cloud 2014 3RD INTERNATIONAL WORKSHOP ON ADVANCED INFORMATION SYSTEMS FOR ENTERPRISES (IWAISE'14), 2014, : 8 - 14
- [9] Security architecture to support multiple security policies based on access control space Tongxin Xuebao, 2006, 2 (107-112+118):
- [10] Introducing business process into legacy information systems BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2005, 3649 : 452 - 457