{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:18:55Z","timestamp":1767651535088},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763538"},{"type":"electronic","value":"9783319763545"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76354-5_33","type":"book-chapter","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T11:43:48Z","timestamp":1520595828000},"page":"361-373","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Comparative Study on Access Control Models and Security Requirements in Workflow Systems"],"prefix":"10.1007","author":[{"given":"Monsef","family":"Boughrous","sequence":"first","affiliation":[]},{"given":"Hanan","family":"El Bakkali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"key":"33_CR1","unstructured":"Workflow Management Coalition Terminology & Glossary, June 1996. http:\/\/www.aiai.ed.ac.uk\/project\/wfmc\/ARCHIVE\/DOCS\/glossary\/glossary.html"},{"key":"33_CR2","unstructured":"Hollingsworth, D.: Workflow management coalition the workflow reference model. The Workflow Management Coalition Specification, no. TC00-1003, January 1995"},{"key":"33_CR3","volume-title":"The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice","author":"J Andress","year":"2014","unstructured":"Andress, J.: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, 2nd edn. Syngress, Waltham (2014)","edition":"2"},{"key":"33_CR4","unstructured":"Workflow Security Considerations - White paper. Workflow Management Coalition, vol. 1.0, no. WFMC-TC-1019, February 1998"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Atluri, V., Warner, J.: Security for workflow systems. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security. Springer, Boston (2008)","DOI":"10.1007\/978-0-387-48533-1_9"},{"issue":"6","key":"33_CR6","doi-asserted-by":"crossref","first-page":"1220","DOI":"10.1109\/TSMCA.2010.2046727","volume":"40","author":"T Ahmed","year":"2010","unstructured":"Ahmed, T., Tripathi, A.R.: Security policies in distributed CSCW and workflow systems. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(6), 1220\u20131231 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Scarfone, K.: Guidelines for Access Control System Evaluation Metrics. NISTIR 7874, September 2012","DOI":"10.6028\/NIST.IR.7874"},{"issue":"4","key":"33_CR8","first-page":"267","volume":"11","author":"H Bakkali El","year":"2013","unstructured":"El Bakkali, H.: Enhancing workflow systems resiliency by using delegation and priority concept. J. Digital Inf. Manage. 11(4), 267\u2013276 (2013)","journal-title":"J. Digital Inf. Manage."},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Younis A., Kifayat K., Merabti M.: A novel evaluation criteria to cloud based access control models. In: 11th International Conference on Innovations in Information Technology. IEEE (2015)","DOI":"10.1109\/INNOVATIONS.2015.7381517"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"El Kandoussi, A., El Bakkali, H.: On access control requirements for inter-organizational workflow. In: The 4th Edition of National Security Days. IEEE, May 2014","DOI":"10.1109\/JNS4.2014.6850128"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Sahafizadeh, E., Parsa, S.: Survey on access control models. IEEE (2010)","DOI":"10.1109\/ICFCC.2010.5497850"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Crampton, J., Gagarin, A., Gutin, G., Jones, M., Wahlstrom, M.: On the satisfiability of constraints in workflow systems. In: ACM Transactions on Private Security, vol. 19 (2016)","DOI":"10.1145\/2988239"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Ali, A., Habiba, U., Shibli, M.A.: Taxonomy of delegation model. In: 12th International Conference on Information Technology - New Generations (2015)","DOI":"10.1109\/ITNG.2015.41"},{"issue":"4","key":"33_CR14","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MSP.2009.102","volume":"7","author":"Q Ni","year":"2009","unstructured":"Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy-aware role-based access control. IEEE Secur. Priv. 7(4), 35\u201343 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"33_CR15","unstructured":"Stallings, W., Brown, L.: Computer Security: Principles and Practice, 3rd edn. Pearson (2015)"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Bai, Q., Zheng, Y.: Study on the access control model in information security. IEEE, July 2011","DOI":"10.1109\/CSQRWC.2011.6037079"},{"key":"33_CR17","unstructured":"American national standard for information technology: Role based access control. ANSI INCITS 359 (2004)"},{"key":"33_CR18","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.future.2013.05.010","volume":"31","author":"WW Smari","year":"2014","unstructured":"Smari, W.W., Clemente, P., Lalande, J.-F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future Gener. Comput. Syst. 31, 147\u2013168 (2014)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"33_CR19","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MC.2015.33","volume":"48","author":"VC Hu","year":"2015","unstructured":"Hu, V.C., Kuhn, D.R., Ferraiolo, D.F.: Attribute-based access control. IEEE Comput. 48(2), 85\u201388 (2015)","journal-title":"IEEE Comput."},{"key":"33_CR20","unstructured":"Yi, L., Ke, X., Junde, S.: A task-attribute-based workflow access control model. IEEE (2013)"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Mallare, I.J.G., Pancho-Festin, S.: Combining task and role based access control with multi-constraints for a medical workflow system. IEEE (2013)","DOI":"10.1109\/ICITCS.2013.6717814"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Sainan L.: Task-role-based access control model and its implementation. In: 2nd International Conference on Education Technology and Computer. IEEE (2010)","DOI":"10.1109\/ICETC.2010.5529541"},{"issue":"6","key":"33_CR23","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/MC.2010.155","volume":"43","author":"DR Kuhn","year":"2010","unstructured":"Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. IEEE Comput. 43(6), 79\u201381 (2010)","journal-title":"IEEE Comput."},{"key":"33_CR24","doi-asserted-by":"crossref","unstructured":"Rajpoot, Q.M., Jensen, C.D.: Attributes enhanced role-based access control model. In: Proceedings of the 12th International Conference, TrustBus 2015, Valencia, Spain, p. 317, 1\u20132 September 2015","DOI":"10.1007\/978-3-319-22906-5_1"},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Qi, H., Luo, X., Di, X., Li, J., Yang, H., Jiang, Z.: Access control model based on role and attribute and its implementation. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE (2016)","DOI":"10.1109\/CyberC.2016.21"},{"key":"33_CR26","doi-asserted-by":"crossref","unstructured":"Kalam, A.A.E., et al.: Organization based access control. In: Proceedings POLICY 2003, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 120\u2013131 (2003)","DOI":"10.1109\/POLICY.2003.1206966"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Xu, M., Wijesekera, D.: A role-based XACML administration and delegation profile and its enforcement architecture. In: SWS 2009. ACM (2009)","DOI":"10.1145\/1655121.1655132"},{"key":"33_CR28","doi-asserted-by":"crossref","unstructured":"Xu, M., Wijesekera, D., Zhang, X., Corray, D.: Towards session-ware RBAC administration and enforcement with XACML. In: The IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY) (2009)","DOI":"10.1109\/POLICY.2009.27"}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76354-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T15:37:03Z","timestamp":1570894623000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76354-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763538","9783319763545"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76354-5_33","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}