Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Separation of Duty in Information Security
Separation of Duty (SoD) is a fundamental security principle that ensures that critical tasks or
functions are divided upon multiple users in order to prevent fraud. The topic of SoD spans …
functions are divided upon multiple users in order to prevent fraud. The topic of SoD spans …
Semi-formal transformation of secure business processes into analysis class and use case models: an MDA approach
A Rodríguez, IGR de Guzmán… - Information and …, 2010 - Elsevier
CONTEXT: Model-Driven Development (MDD) is an alternative approach for information
systems development. The basic underlying concept of this approach is the definition of …
systems development. The basic underlying concept of this approach is the definition of …
Task-based entailment constraints for basic workflow patterns
Access Control decisions are based on the authorisation policies defined for a system as
well as observed context and behaviour when evaluating these constraints at runtime …
well as observed context and behaviour when evaluating these constraints at runtime …
Privacy protection for recommendation system: a survey
W Huang, B Liu, H Tang - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
Recommendation system have become one of the most well-liked and accepted way to
solve overload of information or merchandise. By collecting user's personal data for …
solve overload of information or merchandise. By collecting user's personal data for …
[หนังสือ][B] Attribute-based access control models and implementation in cloud infrastructure as a service
X ** - 2014 - search.proquest.com
Recently, there has been considerable interest in attribute-based access control (ABAC) to
overcome the limitations of the classical access control models (ie, discretionary-DAC …
overcome the limitations of the classical access control models (ie, discretionary-DAC …
Systems and methods for integrating process perspectives and abstraction levels into process modeling
I Markovic - US Patent 8,468,491, 2013 - Google Patents
Methods and systems for integrating process perspectives and abstraction levels into
business process modeling are described. In one example embodiment, modeling business …
business process modeling are described. In one example embodiment, modeling business …
Implementing ACL-based policies in XACML
G Karjoth, A Schade - 2008 Annual Computer Security …, 2008 - ieeexplore.ieee.org
XACML is commonly used as a policy exchange mechanism, decision engines are
available, and verification tools are under development. However, no support for legacy …
available, and verification tools are under development. However, no support for legacy …
Adaptive identity and access management—contextual data based policies
Due to compliance and IT security requirements, company-wide identity and access
management within organizations has gained significant importance in research and …
management within organizations has gained significant importance in research and …
[หนังสือ][B] A security language for BPMN process models
Security mechanisms are essential for business processes. Currently, business-process-
management systems (BPMSs) provide relatively little security support, and programmers …
management systems (BPMSs) provide relatively little security support, and programmers …
Static enforcement of process-level security and compliance specifications for cloud-based systems
AD Brucker, I Hang - US Patent 9,286,187, 2016 - Google Patents
BACKGROUND Business-process driven systems form the backbone of most modern
enterprises. Consequently, process models are becoming more and more important (eg, as …
enterprises. Consequently, process models are becoming more and more important (eg, as …