Sciweavers

116 search results - page 9 / 24
» Secure Role-Based Workflow Models
Sort
View
DEXAW
2004
IEEE
82views Database» more  DEXAW 2004»
14 years 1 months ago
Supporting Public Software Acquisition Workflows - Implications for Data Models
Many software acquisition projects are doomed to fail due to a lack of integration of acquisition and development processes on the one hand and, because of shortcomings of classic...
Werner Aigner, Peter Regner, Thomas Wiesinger, Jos...
JCP
2008
142views more  JCP 2008»
13 years 9 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
DGO
2009
175views Education» more  DGO 2009»
13 years 11 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
DBSEC
1998
115views Database» more  DBSEC 1998»
13 years 11 months ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
IJNSEC
2007
127views more  IJNSEC 2007»
13 years 9 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan