Workflows and role-based access control models need to be suitably merged, in order to allow users to perform processes in a correct way, according to the given data access policies and the temporal constraints. Given a mapping between workflow models and simple temporal networks with uncertainty, we discuss a mapping between role temporalities and simple temporal networks, and how to connect the two resulting networks to make explicit who can do what, when. If the connected network is still executable, we show how to compute the set of authorized users for each task. Finally, we define security constraints (to prevent users from doing unauthorized actions) and security constraint propagation rules (to propagate security constraints at runt...
Authorization in workflow systems is usually built on top of role-based access control (RBAC), secur...
Authorization in workflow systems is usually built on top of role-based access control (RBAC); secur...
Authorization in workflow systems is usually built on top of role-based access control (RBAC), secur...
Workflows and role-based access control models need to be suitably merged, in order to allow users t...
We define Access-Controlled Temporal Networks (ACTNs) as an extension of Conditional Simple Temporal...
We define Access-Controlled Temporal Networks (ACTNs) as an extension of Conditional Simple Temporal...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
This paper presents a pair of role-based access control models for workow systems, collectively kno...
With the growing needs for and the benefits of\ud sharing resources and information among different ...
With the growing needs for and the benefits of\ud sharing resources and information among different ...
A workflow (WF) is a formal description of a business process in which single atomic work units (tas...
In previous work, we showed how to use an SMT-based model checker to synthesize run-time enforcement...
In recent years, workflow management systems (WFMSs) have gained popularity both in research as well...
Providing restrictive and secure access to resources is a challenging and so-cially important proble...
Authorization in workflow systems is usually built on top of role-based access control (RBAC); secur...
Authorization in workflow systems is usually built on top of role-based access control (RBAC), secur...
Authorization in workflow systems is usually built on top of role-based access control (RBAC); secur...
Authorization in workflow systems is usually built on top of role-based access control (RBAC), secur...
Workflows and role-based access control models need to be suitably merged, in order to allow users t...
We define Access-Controlled Temporal Networks (ACTNs) as an extension of Conditional Simple Temporal...
We define Access-Controlled Temporal Networks (ACTNs) as an extension of Conditional Simple Temporal...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
This paper presents a pair of role-based access control models for workow systems, collectively kno...
With the growing needs for and the benefits of\ud sharing resources and information among different ...
With the growing needs for and the benefits of\ud sharing resources and information among different ...
A workflow (WF) is a formal description of a business process in which single atomic work units (tas...
In previous work, we showed how to use an SMT-based model checker to synthesize run-time enforcement...
In recent years, workflow management systems (WFMSs) have gained popularity both in research as well...
Providing restrictive and secure access to resources is a challenging and so-cially important proble...
Authorization in workflow systems is usually built on top of role-based access control (RBAC); secur...
Authorization in workflow systems is usually built on top of role-based access control (RBAC), secur...
Authorization in workflow systems is usually built on top of role-based access control (RBAC); secur...
Authorization in workflow systems is usually built on top of role-based access control (RBAC), secur...