Business process management: a comprehensive survey

WMP Van der Aalst - International Scholarly Research Notices, 2013 - Wiley Online Library
Business Process Management (BPM) research resulted in a plethora of methods,
techniques, and tools to support the design, enactment, management, and analysis of …

Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

A role-based access control model and reference implementation within a corporate intranet

DF Ferraiolo, JF Barkley, DR Kuhn - ACM Transactions on Information …, 1999 - dl.acm.org
This paper describes NIST's enhanced RBAC model and our approach to designing and
implementing RBAC features for networked Web servers. The RBAC model formalized in …

TRBAC: A temporal role-based access control model

E Bertino, PA Bonatti, E Ferrari - Proceedings of the fifth ACM workshop …, 2000 - dl.acm.org
Role-based access control (RBAC) models are receiving increasing attention as a
generalized approach to access control. Roles can be active at certain time periods and non …

The ARBAC97 model for role-based administration of roles

R Sandhu, V Bhamidipati, Q Munawer - ACM Transactions on …, 1999 - dl.acm.org
In role-based access control (RBAC), permissions are associated with roles' and users are
made members of roles, thereby acquiring the roles; permissions. RBAC's motivation is to …

A generalized temporal role-based access control model

JBD Joshi, E Bertino, U Latif… - IEEE transactions on …, 2005 - ieeexplore.ieee.org
Role-based access control (RBAC) models have generated a great interest in the security
community as a powerful and generalized approach to security management. In many …

Towards comprehensive support for organizational mining

M Song, WMP Van der Aalst - Decision support systems, 2008 - Elsevier
Process mining has emerged as a way to analyze processes based on the event logs of the
systems that support them. Today's information systems (eg, ERP systems) log all kinds of …

Access control in collaborative systems

W Tolone, GJ Ahn, T Pai, SP Hong - ACM Computing Surveys (CSUR), 2005 - dl.acm.org
Balancing the competing goals of collaboration and security is a difficult, multidimensional
problem. Collaborative systems often focus on building useful connections among people …

Configurable multi-perspective business process models

M La Rosa, M Dumas, AHM Ter Hofstede… - Information Systems, 2011 - Elsevier
A configurable process model provides a consolidated view of a family of business
processes. It promotes the reuse of proven practices by providing analysts with a generic …

Security models for web-based applications

JBD Joshi, WG Aref, A Ghafoor… - Communications of the …, 2001 - dl.acm.org
THE RAPID PROLIFERATION of the Internet and the cost-effective growth of its key enabling
technologies are revolutionizing information technology and creating unprecedented …