Abstract — Workflows are often used to represent enterprise-type activities, and authorisation control is an important security consideration in enterprise-level applications. Role-Based Access Control (RBAC) is a popular authorisation control scheme under which users are assigned to certain roles, and the roles are associated with permissions. This paper presents a novel mechanism for modelling workflow execution in cluster-based resource pools under Role-Based Access Control (RBAC) schemes. Our modelling approach uses Coloured Timed Petri-Nets, and various authorisation constraints are modelled, including role constraints, temporal constraints, cardinality constraints, Binding of Duty and Separation of Duty constraints, etc. The interacti...
Abstract—Organisations are facilitated and conducted using workflow management systems. Currently, w...
M.Sc.Role-based access control (RBAC) associates roles with privileges and users with roles. These a...
In this paper, we present a formal definition in temporal logic for an authorization model for an ad...
Abstract — Workflows are often used to represent enterprise-type activities, and authorisation contr...
It has been a subject of a significant amount of research to automate the execution of workflows (or...
Role-Based Access Control (RBAC) remains one of the most popular authorization control mechanisms. W...
It is becoming common practice to migrate signal-based video workflows to IT-based Video workflows. ...
Automating the execution of workflows (or business processes) on computer resources has been the sub...
When investigating the performance of running scientific/commercial workflows in parallel and distri...
This paper presents a pair of role-based access control models for workflow systems, collectively kn...
A successful execution of a Business Process (BP) is possible only if the proper coordination exists...
Businesses are continually striving to become more efficient. In an effort to achieve optimal effici...
In recent years, workflow management systems (WFMSs) have gained popularity both in research as well...
One reason workflow systems have been criticized as being inflexible is that they lack support for d...
Many workflow management systems have been developed to enhance the performance of workflow executio...
Abstract—Organisations are facilitated and conducted using workflow management systems. Currently, w...
M.Sc.Role-based access control (RBAC) associates roles with privileges and users with roles. These a...
In this paper, we present a formal definition in temporal logic for an authorization model for an ad...
Abstract — Workflows are often used to represent enterprise-type activities, and authorisation contr...
It has been a subject of a significant amount of research to automate the execution of workflows (or...
Role-Based Access Control (RBAC) remains one of the most popular authorization control mechanisms. W...
It is becoming common practice to migrate signal-based video workflows to IT-based Video workflows. ...
Automating the execution of workflows (or business processes) on computer resources has been the sub...
When investigating the performance of running scientific/commercial workflows in parallel and distri...
This paper presents a pair of role-based access control models for workflow systems, collectively kn...
A successful execution of a Business Process (BP) is possible only if the proper coordination exists...
Businesses are continually striving to become more efficient. In an effort to achieve optimal effici...
In recent years, workflow management systems (WFMSs) have gained popularity both in research as well...
One reason workflow systems have been criticized as being inflexible is that they lack support for d...
Many workflow management systems have been developed to enhance the performance of workflow executio...
Abstract—Organisations are facilitated and conducted using workflow management systems. Currently, w...
M.Sc.Role-based access control (RBAC) associates roles with privileges and users with roles. These a...
In this paper, we present a formal definition in temporal logic for an authorization model for an ad...