Business process management: a comprehensive survey
WMP Van der Aalst - International Scholarly Research Notices, 2013 - Wiley Online Library
Business Process Management (BPM) research resulted in a plethora of methods,
techniques, and tools to support the design, enactment, management, and analysis of …
techniques, and tools to support the design, enactment, management, and analysis of …
Database security-concepts, approaches, and challenges
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …
daily business, they become more vulnerable to security breaches even as they gain …
A role-based access control model and reference implementation within a corporate intranet
This paper describes NIST's enhanced RBAC model and our approach to designing and
implementing RBAC features for networked Web servers. The RBAC model formalized in …
implementing RBAC features for networked Web servers. The RBAC model formalized in …
TRBAC: A temporal role-based access control model
Role-based access control (RBAC) models are receiving increasing attention as a
generalized approach to access control. Roles can be active at certain time periods and non …
generalized approach to access control. Roles can be active at certain time periods and non …
The ARBAC97 model for role-based administration of roles
In role-based access control (RBAC), permissions are associated with roles' and users are
made members of roles, thereby acquiring the roles; permissions. RBAC's motivation is to …
made members of roles, thereby acquiring the roles; permissions. RBAC's motivation is to …
A generalized temporal role-based access control model
Role-based access control (RBAC) models have generated a great interest in the security
community as a powerful and generalized approach to security management. In many …
community as a powerful and generalized approach to security management. In many …
Towards comprehensive support for organizational mining
Process mining has emerged as a way to analyze processes based on the event logs of the
systems that support them. Today's information systems (eg, ERP systems) log all kinds of …
systems that support them. Today's information systems (eg, ERP systems) log all kinds of …
Access control in collaborative systems
W Tolone, GJ Ahn, T Pai, SP Hong - ACM Computing Surveys (CSUR), 2005 - dl.acm.org
Balancing the competing goals of collaboration and security is a difficult, multidimensional
problem. Collaborative systems often focus on building useful connections among people …
problem. Collaborative systems often focus on building useful connections among people …
Configurable multi-perspective business process models
A configurable process model provides a consolidated view of a family of business
processes. It promotes the reuse of proven practices by providing analysts with a generic …
processes. It promotes the reuse of proven practices by providing analysts with a generic …
Security models for web-based applications
THE RAPID PROLIFERATION of the Internet and the cost-effective growth of its key enabling
technologies are revolutionizing information technology and creating unprecedented …
technologies are revolutionizing information technology and creating unprecedented …