{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:02:29Z","timestamp":1725465749620},"publisher-location":"Boston","reference-count":18,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"0387287531"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-29773-1_15","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T11:00:15Z","timestamp":1149678015000},"page":"219-233","source":"Crossref","is-referenced-by-count":0,"title":["Hypr&amp;A - A Security Model for the Support Processes in Egovernment"],"prefix":"10.1007","author":[{"given":"Tatyana","family":"Podgayetskaya","sequence":"first","affiliation":[]},{"given":"Wolffried","family":"Stucky","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Atluri, V. and Chun, S.A., 2003, Handling Dynamic Changes in Decentralized Workflow Execution Environments, DEXA 2003 Proceedings: P. 813\u2013825.","DOI":"10.1007\/978-3-540-45227-0_79"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Atluri, V. and Huang W.-K., 1996, An Authorization Model for Workflows, Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security: P. 44\u201364.","DOI":"10.1007\/3-540-61770-1_27"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Atluri, V., Huang W.-K. and Bertino, E., 1997, An Execution Model for Multilevel Seccure Workflows, Proceedings of the IFIP TC11 WG11.3: P. 151\u2013165.","DOI":"10.1007\/978-0-387-35285-5_9"},{"key":"15_CR4","unstructured":"Botha, R.A.., 2001, CoSAWoE-A Model for Context-sensitive Access Control in Workflow Environments. Dissertation, Rand Afrikaans University i.Br."},{"key":"15_CR5","unstructured":"Dridi, F., Muschall, B., Pernul, G., 2003, An Administration Console for the CSAP System. In: Short Paper Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE 2003): P.345\u2013350."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Dridi, F., Muschall, B. and Pernul, G., 2004., Administration of an RBAC System. Proc.of the 37th Hawaiian International Conference on System Sciences (HICSS 2004):P. 1014\u20131026","DOI":"10.1109\/HICSS.2004.1265447"},{"key":"15_CR7","unstructured":"Eckert, C, 2003, IT-Sicherheit. Oldenburg."},{"key":"15_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45150-1","volume-title":"IT-Security and Privacy","author":"S. Fischer-H\u00fcbner","year":"2001","unstructured":"Fischer-H\u00fcbner, S., 2001, IT-Security and Privacy: Springer Berlin et al."},{"key":"15_CR9","unstructured":"He, Q., 2003, Privacy Enforcement with an Extended Role-Based Access Control Model NCSU Computer Science Technical Report TR-2003-09."},{"key":"15_CR10","first-page":"33","volume":"21","author":"P. C. K. Hung","year":"2003","unstructured":"Hung, P. C. K., Karlapalem K.: A secure workflow. Proceedings of the Australasian information security workshop conference on ACSW, 2003, V21: P. 33\u201341.","journal-title":"Proceedings of the Australasian information security workshop conference on ACSW"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Pernul, G., 1992, Security Constraint Processing During Multilevel Secure Database Design, in Proceedings of Eighth Annual IEEE Computer Security Applications Conference,: P. 229\u2013247.","DOI":"10.1109\/CSAC.1992.228231"},{"key":"15_CR12","unstructured":"NIST, 2002, The Economic Impact of Role Based Access Control. Research Triangle Institute. NIST Planning Report 02-01."},{"key":"15_CR13","unstructured":"Podgayetskaya, T., Ratz, D. and Stucky, W., 2003, Modell eines Workflow-Systems zur Erh\u00f6hung der Sicherheit von Web Services, Proceedings E. Otner (Hrsg.) in Symposium Entwicklung Web-Services basierter Anwendungen. In Rahmen der 33. Jahrestagung der GI: P. 37\u201352."},{"key":"15_CR14","first-page":"1007","volume":"P2195","author":"T. Podgayetskaya","year":"2004","unstructured":"Podgayetskaya, T., Stucky, W., 2004, A Model of Business Process Support System for E-Government. DEXA 2004 Proceedings. Published by the IEEE Computer Society, P2195: P.1007\u20131015.","journal-title":"DEXA 2004 Proceedings"},{"issue":"2","key":"15_CR15","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E. J., Feinstein, H.L. and Youman, C.E., 1996, Role-Based Access Control Models, IEEE Computer 29(2): P. 38\u201347.","journal-title":"IEEE Computer"},{"key":"15_CR16","unstructured":"Sandhu, R.S., Ferraiolo, D. F., Kuhn, D. R., 200, The NIST Model for Role Based Access Control: Towards a Unified Standard, Proceedings, 5th ACM Workshop on Role Based Access Control, P.26\u201337."},{"key":"15_CR17","unstructured":"Schier, K., 1999, Vertraurensw\u00fcrdige Kommunikation im elektronischen Zahlungsverkehr. Dissertation, Universit\u00e4t Hamburg i.Br."},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1142\/S0218843003000814","volume":"4","author":"J. Wainer","year":"2003","unstructured":"Wainer, J., Barthelmess, P., and Kumar, A, 2003, W-RBAC-A Workflow Security Model Incorporating Controlled Overriding of Constraints. J of Coop. Inf. Sys.4,: P. 455\u201348.","journal-title":"J of Coop. Inf. Sys."}],"container-title":["IFIP International Federation for Information Processing","Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-29773-1_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T04:59:13Z","timestamp":1619499553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-29773-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387287531"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/0-387-29773-1_15","relation":{},"subject":[]}}