{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T08:04:06Z","timestamp":1772784246291,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540250166","type":"print"},{"value":"9783540322573","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32257-3_12","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T19:46:19Z","timestamp":1278531979000},"page":"122-133","source":"Crossref","is-referenced-by-count":22,"title":["Model Driven Security for Inter-organizational Workflows in e-Government"],"prefix":"10.1007","author":[{"given":"Ruth","family":"Breu","sequence":"first","affiliation":[]},{"given":"Michael","family":"Hafner","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Weber","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Novak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Austrian Signature Act (Signaturgesetz - SigG), Art. 1 of the Act published in the Austrian Federal Law Gazette, part I, Nr. 190\/1999"},{"key":"12_CR2","unstructured":"Federal Act on Provisions Facilitating Electronic Communications with Public Bodies (E-Government Gesetz - E-GovG), Art. 1 of the Act published in the Austrian Federal Law Gazette, part I, Nr. 10\/2004, entered into force on 1 March (2004)"},{"key":"12_CR3","unstructured":"Federal Act concerning the Protection of Personal Data (Datenschutzgesetz - DSG2000), published in the Austrian Federal Law Gazette, part I No. 165\/1999, on 17 (August 1999)"},{"key":"12_CR4","unstructured":"Austrian Security Manual, http:\/\/www.cio.gv.at\/securenetworks\/sihb\/"},{"key":"12_CR5","unstructured":"OECD Guidelines for the Security of Information Systems and Networks, http:\/\/www.ftc.gov\/bcp\/conline\/edcams\/infosecurity\/popups\/OECD_guidelines.pdf"},{"key":"12_CR6","first-page":"227","volume-title":"The Future of Software Engineering","author":"P. Devanbu","year":"2000","unstructured":"Devanbu, P., Stubblebine, S.: Software engineering for security: a roadmap. In: Finkelstein, A. (ed.) The Future of Software Engineering, pp. 227\u2013239. ACM Press, New York (2000)"},{"key":"12_CR7","volume-title":"Advanced Databases: Technology Design","author":"E. Ferrari","year":"2000","unstructured":"Ferrari, E., Thuraisingham, B.: Secure Database Systems. In: Piattini, M., D\u00edaz, O. (eds.) Advanced Databases: Technology Design. Artech House, London (2000)"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/52.976937","volume":"19","author":"A. Hall","year":"2002","unstructured":"Hall, A., Chapman, R.: Correctness by construction developing a commercial secure system. IEEE Software\u00a019(1), 18\u201325 (2002)","journal-title":"IEEE Software"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"The authors: Towards a Systematic Development of Secure Systems. Information Systems Security 13(3) (2004)","DOI":"10.1201\/1086\/44530.13.3.20040701\/83064.2"},{"key":"12_CR10","unstructured":"The authors: Towards Model Driven Security of Inter-Organizational Workflows. Accepted for SAPS (2004)"},{"key":"12_CR11","unstructured":"The authors: Modeling and Realizing Security-Critical Inter-Organizational Workflows. In: W. Dosch, N. Debnath (Eds.): Proceedings IASSE 2004, ISCA (2004) ISBN 1-880843-52-X"},{"key":"12_CR12","unstructured":"BEA, IBM, Microsoft, SAP AG, Siebel Systems Specification: Business Process Execution Language for Web Services Version 1.1 (May 2003), http:\/\/www.ibm.com\/developerworks\/library\/ws-bpel"},{"key":"12_CR13","unstructured":"Christensen, E., Curbera, F., Meredith, G., Weerawarana, S.: Web Services Description Language (WSDL) 1.1., http:\/\/www.w3.org\/TR\/wsdl"},{"key":"12_CR14","unstructured":"BEA, IBM, Microsoft: Web services Transaction (WS-Transaction), http:\/\/www-6.ibm.com\/ developerworks\/webservices\/library\/ws-transpec\/"},{"key":"12_CR15","unstructured":"BEA, Intalio, Sun Microsystems, SAP: Web Service Choreography Interface (WSCI) 1.0, http:\/\/www.w3.org\/TR\/wsci\/"},{"key":"12_CR16","unstructured":"Arkin: Business Process Modeling Language. BPMI.org, San Mateo (2002) Proposed Final Draft"},{"key":"12_CR17","unstructured":"IBM, Microsoft, VeriSign: Web services Security (WS-Security), http:\/\/www-106.ibm.com\/developerworks\/webservices\/library\/ws-secure\/"},{"key":"12_CR18","unstructured":"Godik, S., Moses, T.: eXtensible Access Control Markup Language (XACML) Version 1.0 3 OASIS Standard, 18 February (2003), http:\/\/www.oasis-open.org\/committees\/xacml\/repository"},{"key":"12_CR19","unstructured":"Cantor, S., Kemp, J., Maler, E.: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, Last-Call Working Draft 17, 13 July (2004), http:\/\/www.oasis-open.org\/committees\/download.php\/7737\/sstc-saml-core-2.0-draft-17.pdf"},{"key":"12_CR20","unstructured":"Lodderstedt, T.: Model Driven Security: from UML Models to Access Control Architectures. Dissertation, Univ. of Freiburg (2003)"},{"key":"12_CR21","volume-title":"Production Workflow: Concepts and Techniques","author":"F. Leyman","year":"2000","unstructured":"Leyman, F., Roller, D.: Production Workflow: Concepts and Techniques. Prentice-Hall, Englewood Cliffs (2000)"},{"key":"12_CR22","unstructured":"UML: http:\/\/www.uml.org"},{"key":"12_CR23","unstructured":"OMG, UML 2.0 Superstructure Specification, http:\/\/www.omg.org\/docs\/ptc\/03-08-02.pdf"},{"key":"12_CR24","first-page":"140","volume-title":"Proceedings of the 13th International Conference on Advanced Information Systems Engineering (CAiSE 2001)","author":"W.M.P. Aalst van der","year":"2001","unstructured":"van der Aalst, W.M.P., Weske, M.: The P2P appraoch to Interorganizational Workflows. In: Dittrich, K.R., Geppert, A., Norrie, M.C. (eds.) Proceedings of the 13th International Conference on Advanced Information Systems Engineering (CAiSE 2001), pp. 140\u2013156. Springer, Berlin (2001)"},{"key":"12_CR25","unstructured":"IBM: BPWS4J, http:\/\/www.alphaworks.ibm.com\/tech\/bpws4j"},{"issue":"3","key":"12_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/4236.935172","volume":"5","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Castano, S., Ferrari, E.: Securing XML Documents with Author X. IEEE Internet Computing\u00a05(3), 21\u201331 (2001)","journal-title":"IEEE Internet Computing"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Chadwick, D.W.: RBAC Policies in XML for X.509 Based Privilege Management. In: Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives 2002, pp. 39\u201354 (2002)","DOI":"10.1007\/978-0-387-35586-3_3"},{"issue":"4","key":"12_CR28","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1145\/950191.950196","volume":"6","author":"M. Thompson","year":"2003","unstructured":"Thompson, M., Essiari, A., Mudumbai, S.: Certificate-based Authorization Policy in a PKI Environment. ACM Transactions on Information and System Security\u00a06(4), 566\u2013588 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"12_CR29","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/S0378-7206(99)00038-5","volume":"37","author":"W.M.P. Aalst van der","year":"2000","unstructured":"van der Aalst, W.M.P.: Loosely Coupled Interorganizational Workflows: Modeling and Analyzing Workflows Crossing Organizational Boundaries. Information and Management\u00a037(2), 67\u201375 (2000)","journal-title":"Information and Management"},{"issue":"8","key":"12_CR30","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/S0306-4379(00)00003-X","volume":"24","author":"W.M.P. Aalst van der","year":"1999","unstructured":"van der Aalst, W.M.P.: Process-oriented Architectures for Electronic Commerce and Interorganizational Workflow. Information Systems\u00a024(8), 639\u2013671 (1999)","journal-title":"Information Systems"},{"issue":"2","key":"12_CR31","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008388412284","volume":"13","author":"Z. Luo","year":"2000","unstructured":"Luo, Z., Shet, A., Kochut, K., Miller, J.: Exception Handling in Workflow Systems. Applied Intelligence\u00a013(2), 125\u2013147 (2000)","journal-title":"Applied Intelligence"},{"issue":"5","key":"12_CR32","first-page":"277","volume":"15","author":"P. Grefen","year":"2000","unstructured":"Grefen, P., Aberer, K., Hoffner, Y., Ludwig, H.: CrossFlow: cross-organizational workflow management in dynamic virtual enterprises. International Journal of Computer Systems Science & Engineering\u00a015(5), 277\u2013290 (2000)","journal-title":"International Journal of Computer Systems Science & Engineering"},{"issue":"1","key":"12_CR33","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1023\/A:1015374204227","volume":"4","author":"F. Casati","year":"2002","unstructured":"Casati, F., Shan, M.: Event-based Interaction Management for Composite E-Services in eFlow. Information Systems Frontiers\u00a04(1), 19\u201331 (2002)","journal-title":"Information Systems Frontiers"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Atluri, V., Huang, W.K.: Enforcing Mandatory and Discretionary Security in Workflow Management Systems. In: Proceedings of the 5th European Symposium on Research in Computer Security (1996)","DOI":"10.3233\/JCS-1997-5403"},{"issue":"4","key":"12_CR35","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3233\/JCS-1999-7403","volume":"7","author":"E. Gudes","year":"1999","unstructured":"Gudes, E., Olivier, M., van de Riet, R.: Modelling, Specifying and Implementing Workflow Security in Cyberspace. Journal of Computer Security\u00a07(4), 287\u2013315 (1999)","journal-title":"Journal of Computer Security"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Huang, W.K., Atluri, V.: SecureFlow: A secure Web-enabled Workflow Management System. In: ACM Workshop on Role-Based Access Control 1999, pp. 83\u201394 (1999)","DOI":"10.1145\/319171.319179"},{"issue":"4","key":"12_CR37","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1142\/S0218843003000814","volume":"12","author":"J. Wainer","year":"2003","unstructured":"Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC \u2013 A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems\u00a012(4), 455\u2013485 (2003)","journal-title":"International Journal of Cooperative Information Systems"},{"key":"12_CR38","volume-title":"8th ACM Symposium on Access Control Models and Technologies","author":"D. Basin","year":"2003","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security for Process-Oriented Systems. In: 8th ACM Symposium on Access Control Models and Technologies. ACM Press, New York (2003)"},{"key":"12_CR39","unstructured":"Lang, U.: Access Policies for Middleware. PhD Thesis, University of Cambridge (2003)"},{"key":"12_CR40","first-page":"426","volume-title":"Proceedings of the 5th International Conference on the Unified Modeling Language","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) Proceedings of the 5th International Conference on the Unified Modeling Language, pp. 426\u2013441. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","E-Government: Towards Electronic Democracy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32257-3_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:34:46Z","timestamp":1605760486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32257-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540250166","9783540322573"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32257-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}