Sciweavers

177 search results - page 10 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
CAISE
2010
Springer
14 years 6 months ago
In Search of the Holy Grail: Integrating Social Software with BPM Experience Report
The paper is devoted to finding a view on business processes that helps to introduce into business process support systems a notion of shared spaces widely used in social software....
Ilia Bider, Paul Johannesson, Erik Perjons
ESORICS
2005
Springer
15 years 5 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone
CCS
2005
ACM
15 years 5 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
DBSEC
2010
126views Database» more  DBSEC 2010»
15 years 1 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
ICWS
2010
IEEE
15 years 1 months ago
A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality
Abstract--Most work on adaptive workflows offers insufficient flexibility to enforce complex policies regarding dynamic, evolvable and robust workflows. In addition, many proposed ...
Kristof Geebelen, Eryk Kulikowski, Eddy Truyen, Wo...