{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:54:32Z","timestamp":1772808872308,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540748342","type":"print"},{"value":"9783540748359","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74835-9_7","type":"book-chapter","created":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T14:03:08Z","timestamp":1189173788000},"page":"90-105","source":"Crossref","is-referenced-by-count":20,"title":["Satisfiability and Resiliency in Workflow Systems"],"prefix":"10.1007","author":[{"given":"Qihua","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-61770-1_27","volume-title":"ESORICS 1996","author":"V. Atluri","year":"1996","unstructured":"Atluri, V., Huang, W.: An authorization model for workflows. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 44\u201364. Springer, Heidelberg (1996)"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1063979.1063990","volume-title":"SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies","author":"V. Atluri","year":"2005","unstructured":"Atluri, V., Warner, J.: Supporting conditional delegation in secure workflow management systems. In: SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies, pp. 49\u201358. ACM Press, New York (2005)"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security\u00a02(1), 65\u2013104 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"7_CR4","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/SP.1987.10001","volume-title":"Proceedings of the 1987 IEEE Symposium on Security and Privacy","author":"D.D. Clark","year":"1987","unstructured":"Clark, D.D., Wilson, D.R.: A comparision of commercial and military computer security policies. In: Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 184\u2013194. IEEE Computer Society Press, Los Alamitos (1987)"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/1063979.1063986","volume-title":"SACMAT 2005","author":"J. Crampton","year":"2005","unstructured":"Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: SACMAT 2005. Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, pp. 38\u201347. ACM Press, New York (2005)"},{"key":"7_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0515-9","volume-title":"Parameterized Complexity","author":"R. Downey","year":"1999","unstructured":"Downey, R., Fellows, M.: Parameterized Complexity. Springer, Heidelberg (1999)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Kang, M.H., Park, J.S., Froscher, J.N.: Access control mechanisms for inter-organizational workflow, pp. 66\u201374 (2001)","DOI":"10.1145\/373256.373266"},{"key":"7_CR8","volume-title":"CCS","author":"N. Li","year":"2006","unstructured":"Li, N., Tripunitara, M.V., Wang, Q.: Resiliency policies in access control. In: CCS. Proc.\u00a0ACM Conference on Computer and Communications Security, ACM Press, New York (2006)"},{"issue":"2","key":"7_CR9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"7_CR10","first-page":"155","volume-title":"CSFW","author":"K. Tan","year":"2004","unstructured":"Tan, K., Crampton, J., Gunter, C.: The consistency of task-based authorization constraints in workflow systems. In: CSFW. Proceedings of the 17th IEEE Computer Security Foundations Workshop, pp. 155\u2013169. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Wang, Q., Li, N.: Satisfiability and resiliency in workflow systems. Technical Report CERIAS-TR-2007-28, Center for Education and Research in Information Assurance and Security, Purdue University (2007)","DOI":"10.1007\/978-3-540-74835-9_7"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/1133058.1133085","volume-title":"SACMAT","author":"J. Warner","year":"2006","unstructured":"Warner, J., Atluri, V.: Inter-instance authorization constraints for secure workflow management. In: SACMAT. Proc.\u00a0ACM Symposium on Access Control Models and Technologies, pp. 190\u2013199. ACM Press, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74835-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T02:07:38Z","timestamp":1684030058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74835-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748342","9783540748359"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74835-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}