共 50 条
- [21] Blockchain Based Auditable Access Control for Distributed Business Processes 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 12 - 22
- [22] Across-step access control in E-business security Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 453 - 458
- [23] A MAS security framework implementing reputation based policies and owners access control 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 746 - +
- [25] Detection of Multiple-Duty-Related Security Leakage in Access Control Policies 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 65 - 74
- [27] Integrating privacy policies into business processes WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 13 - 25
- [28] Integrating Privacy Policies into Business Processes JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2009, 41 (02): : 155 - 170
- [29] Introducing Agile Controllability in Temporal Business Processes ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2024, EMMSAD 2024, 2024, 511 : 87 - 99
- [30] Aligning legacy information systems to business processes ADVANCED INFORMATION SYSTEMS ENGINEERING, 1998, 1413 : 25 - 39