{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:18Z","timestamp":1725558678700},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_15","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"168-177","source":"Crossref","is-referenced-by-count":3,"title":["A Task-Oriented Access Control Model for WfMS"],"prefix":"10.1007","author":[{"given":"Xu","family":"Liao","sequence":"first","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Stephen C. F.","family":"Chan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Samarati, P.: Access Control: Principles and Practice (September 1994), http:\/\/www.list.gmu.edu\/journal_papers.htm","DOI":"10.1109\/35.312842"},{"issue":"4","key":"15_CR3","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/382912.382913","volume":"3","author":"G.H. Ahn","year":"2000","unstructured":"Ahn, G.H., Sandhu, R.: Role-Based Authorization Constraints Specification. ACM Transactions on Information and System Security\u00a03(4), 207\u2013226 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Atluri, V., Huang, W.K.: An Authorization Model for Workflow. In: Proceedings of the Fourth European Symposium on Research in Computer Security, September 1996, pp. 44\u201364 (1996)","DOI":"10.1007\/3-540-61770-1_27"},{"issue":"1","key":"15_CR6","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/504909.504912","volume":"5","author":"V.A. Atluri","year":"2002","unstructured":"Atluri, V.A., Gal, A.: An Authorization Model for Temporal and Derived Data: Securing Information Portals. ACM Transactions on Information and System Security\u00a05(1), 62\u201394 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Castano, S., Casati, F., Fugini, M.: Managing Workflow Authorization Constraints through Active Database Technology. Information Systems Frontiers, Special Issue on Workflow Automation And Business Process Integration, 319\u2013338 (2001)","DOI":"10.1023\/A:1011461409620"},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and system Security\u00a02(1), 65\u2013104 (1999)","journal-title":"ACM Transactions on Information and system Security"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1023\/A:1012972608697","volume":"18","author":"S. Wu","year":"2002","unstructured":"Wu, S., Sheth, A., Miller, J.: Authorization and Access Control of Application Data in Workflow Systems. Journal of Intelligent Information Systems\u00a018, 71\u201394 (2002)","journal-title":"Journal of Intelligent Information Systems"},{"issue":"3","key":"15_CR10","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/937527.937530","volume":"6","author":"L.H. Zhang","year":"2000","unstructured":"Zhang, L.H., Ahn, G.J., Chu, B.T.: A Rule-Based Framework for Role-Based Delegation and Revocation. ACM Transaction on Information and System Security\u00a06(3), 404\u2013441 (2000)","journal-title":"ACM Transaction on Information and System Security"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, L.H., Ahn, G.J., Chu, B.T.: A Rule-Based Framework for Role-Based Delegation. In: Proceedings of the sixth ACM symposium on Access control models and technologies, May 2001, pp. 153\u2013162 (2001)","DOI":"10.1145\/373256.373289"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Barka, E., Sandhu, R.: Framework for Role-based Delegation Model. In: Proceeding of 23th National Information Systems Security Conference (October 2000)","DOI":"10.1109\/ACSAC.2000.898870"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:32:34Z","timestamp":1605760354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}