Separation of Duty in Information Security

S Groll, L Fuchs, G Pernul - ACM Computing Surveys, 2025 - dl.acm.org
Separation of Duty (SoD) is a fundamental security principle that ensures that critical tasks or
functions are divided upon multiple users in order to prevent fraud. The topic of SoD spans …

Semi-formal transformation of secure business processes into analysis class and use case models: an MDA approach

A Rodríguez, IGR de Guzmán… - Information and …, 2010 - Elsevier
CONTEXT: Model-Driven Development (MDD) is an alternative approach for information
systems development. The basic underlying concept of this approach is the definition of …

Task-based entailment constraints for basic workflow patterns

C Wolter, A Schaad, C Meinel - Proceedings of the 13th ACM symposium …, 2008 - dl.acm.org
Access Control decisions are based on the authorisation policies defined for a system as
well as observed context and behaviour when evaluating these constraints at runtime …

Privacy protection for recommendation system: a survey

W Huang, B Liu, H Tang - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
Recommendation system have become one of the most well-liked and accepted way to
solve overload of information or merchandise. By collecting user's personal data for …

[หนังสือ][B] Attribute-based access control models and implementation in cloud infrastructure as a service

X ** - 2014 - search.proquest.com
Recently, there has been considerable interest in attribute-based access control (ABAC) to
overcome the limitations of the classical access control models (ie, discretionary-DAC …

Systems and methods for integrating process perspectives and abstraction levels into process modeling

I Markovic - US Patent 8,468,491, 2013 - Google Patents
Methods and systems for integrating process perspectives and abstraction levels into
business process modeling are described. In one example embodiment, modeling business …

Implementing ACL-based policies in XACML

G Karjoth, A Schade - 2008 Annual Computer Security …, 2008 - ieeexplore.ieee.org
XACML is commonly used as a policy exchange mechanism, decision engines are
available, and verification tools are under development. However, no support for legacy …

Adaptive identity and access management—contextual data based policies

M Hummer, M Kunz, M Netter, L Fuchs… - EURASIP Journal on …, 2016 - Springer
Due to compliance and IT security requirements, company-wide identity and access
management within organizations has gained significant importance in research and …

[หนังสือ][B] A security language for BPMN process models

J Mülle, S Von Stackelberg, K Böhm - 2011 - core.ac.uk
Security mechanisms are essential for business processes. Currently, business-process-
management systems (BPMSs) provide relatively little security support, and programmers …

Static enforcement of process-level security and compliance specifications for cloud-based systems

AD Brucker, I Hang - US Patent 9,286,187, 2016 - Google Patents
BACKGROUND Business-process driven systems form the backbone of most modern
enterprises. Consequently, process models are becoming more and more important (eg, as …