{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:12:33Z","timestamp":1739423553267,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642042799"},{"type":"electronic","value":"9783642042805"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04280-5_31","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T09:25:31Z","timestamp":1253265931000},"page":"400-414","source":"Crossref","is-referenced-by-count":7,"title":["Task Delegation Based Access Control Models for Workflow Systems"],"prefix":"10.1007","author":[{"given":"Khaled","family":"Gaaloul","sequence":"first","affiliation":[]},{"given":"Fran\u00e7ois","family":"Charoy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"e-Government at a Decisive Moment: Sketching a Roadmap to Excellence","year":"2004","unstructured":"Traunm\u00fcller, R., Wimmer, M. (eds.): e-Government at a Decisive Moment: Sketching a Roadmap to Excellence. LNCS, vol.\u00a03183. Springer, Heidelberg (2004)"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-77010-7_19","volume-title":"Web Information Systems Engineering \u2013 WISE 2007 Workshops","author":"A. Schaad","year":"2007","unstructured":"Schaad, A.: A framework for evidence lifecycle management. In: Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE Workshops 2007. LNCS, vol.\u00a04832, pp. 191\u2013200. Springer, Heidelberg (2007)"},{"issue":"2","key":"31_CR3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"31_CR4","first-page":"168","volume-title":"Proceedings of the 16th Annual Computer Security Applications Conference","author":"E. Barka","year":"2000","unstructured":"Barka, E., Sandhu, R.: Framework for role-based delegation models. In: Proceedings of the 16th Annual Computer Security Applications Conference, Washington, DC, USA, pp. 168\u2013176. IEEE Computer Society, Los Alamitos (2000)"},{"key":"31_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-540-31979-5_15","volume-title":"Information Security Practice and Experience","author":"X. Liao","year":"2005","unstructured":"Liao, X., Zhang, L., Chan, S.C.F.: A task-oriented access control model for wfMS. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol.\u00a03439, pp. 168\u2013177. Springer, Heidelberg (2005)"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/SECURWARE.2008.21","volume-title":"SECURWARE 2008: Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies","author":"K. Gaaloul","year":"2008","unstructured":"Gaaloul, K., Schaad, A., Flegel, U., Charoy, F.: A secure task delegation model for workflows. In: SECURWARE 2008: Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies, Washington, DC, USA, pp. 10\u201315. IEEE Computer Society, Los Alamitos (2008)"},{"key":"31_CR7","unstructured":"R4eGov Technical Annex 1. Towards e-Administration in the large. Sixth Framework Programme, Information Society Technologies (March 2006), http:\/\/www.r4egov.info"},{"key":"31_CR8","unstructured":"The Workflow Management Coalition. Process Definition Interface \u2013 XML Process Definition Language (2005), http:\/\/www.wfmc.org ."},{"issue":"1","key":"31_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.datak.2004.03.008","volume":"51","author":"K.A. Schulz","year":"2004","unstructured":"Schulz, K.A., Orlowska, M.E.: Facilitating cross-organisational workflows with a workflow view approach. Data Knowl. Eng.\u00a051(1), 109\u2013147 (2004)","journal-title":"Data Knowl. Eng."},{"key":"31_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-32257-3_17","volume-title":"E-Government: Towards Electronic Democracy","author":"M. Contenti","year":"2005","unstructured":"Contenti, M., Mecella, M., Termini, A., Baldoni, R.: A Distributed Architecture for Supporting e-Government Cooperative Processes. In: B\u00f6hlen, M.H., Gamper, J., Polasek, W., Wimmer, M.A. (eds.) TCGOV 2005. LNCS (LNAI), vol.\u00a03416, pp. 181\u2013192. Springer, Heidelberg (2005)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Jensen, C., Scacchi, W.: Collaboration, Leadership, Control, and Conflict Negotiation in the NetBeans.org Community. In: 26th International Software Engineering Conference (2004)","DOI":"10.1049\/ic:20040264"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Gaaloul, K., Charoy, F., Schaad, A.: Modelling Task Delegation for Human-Centric eGovernment Workflows. To appear in the 10th International Digital Government Research Conference (dg.o 2009).","DOI":"10.1109\/SECURWARE.2008.21"},{"key":"31_CR13","unstructured":"Schaad, A.: A Framework for Organisational Control Principles. PhD thesis, The University of York, England (2003)"},{"issue":"3","key":"31_CR14","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/937527.937530","volume":"6","author":"L. Zhang","year":"2003","unstructured":"Zhang, L., Ahn, G.-J., Chu, B.-T.: A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security\u00a06(3), 404\u2013441 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"31_CR15","first-page":"31","volume-title":"SACMAT 2008: Proceedings of the 13th ACM symposium on Access control models and technologies","author":"J. Crampton","year":"2008","unstructured":"Crampton, J., Khambhammettu, H.: Delegation and satisfiability in workflow systems. In: SACMAT 2008: Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 31\u201340. ACM, New York (2008)"},{"key":"31_CR16","first-page":"45","volume-title":"Metal Detection","author":"S. Kandala","year":"2002","unstructured":"Kandala, S., Sandhu, R., Savith, K., Savith, K., Ravi, S., Ravi, S.: Secure role-based workflow models. In: Metal Detection, vol.\u00a0II, Technical Proposal, FETC Contract DE-AR2195MC32089, pp. 45\u201358. Kluwer, Dordrecht (2002)"},{"key":"31_CR17","first-page":"411","volume-title":"ICDCS 2002: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS 2002)","author":"E. Freudenthal","year":"2002","unstructured":"Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V.: drbac: Distributed role-based access control for dynamic coalition environments. In: ICDCS 2002: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS 2002), Washington, DC, USA, p. 411. IEEE Computer Society, Los Alamitos (2002)"},{"key":"31_CR18","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/CSFW.2001.930135","volume-title":"CSFW 2001: Proceedings of the 14th IEEE workshop on Computer Security Foundations","author":"A. Hagstrom","year":"2001","unstructured":"Hagstrom, A., Jajodia, S., Parisi-Presicce, F., Wijesekera, D.: Revocations-A Classification. In: CSFW 2001: Proceedings of the 14th IEEE workshop on Computer Security Foundations, Washington, DC, USA, p. 44. IEEE Computer Society, Los Alamitos (2001)"},{"key":"31_CR19","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/POLICY.2003.1206964","volume-title":"POLICY 2003: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks","author":"A. Belokosztolszki","year":"2003","unstructured":"Belokosztolszki, A., Eyers, D.M., Moody, K.: Policy Contexts: Controlling Information Flow in Parameterised RBAC. In: POLICY 2003: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Washington, DC, USA, p. 99. IEEE Computer Society, Los Alamitos (2003)"},{"key":"31_CR20","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/775412.775431","volume-title":"SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies","author":"X. Zhang","year":"2003","unstructured":"Zhang, X., Oh, S., Sandhu, R.: PBDM: a flexible delegation model in RBAC. In: SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 149\u2013157. ACM Press, New York (2003)"},{"key":"31_CR21","unstructured":"eXtensible Access Control Markup Language (XACML v2.0). Standard, Organization for the Advancement of Structured Information Standards (OASIS) (February 2005), http:\/\/docs.oasis-open.org\/xacml\/2.0\/access-control-xacml-2.0-core-spec-os.pdf"},{"key":"31_CR22","unstructured":"Rissanen, E., Firozabadi, B.S.: Administrative Delegation in XACML. Swedish Institute of Computer Science, Kista-Sweden"}],"container-title":["IFIP Advances in Information and Communication Technology","Software Services for e-Business and e-Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04280-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T07:21:49Z","timestamp":1739344909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04280-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642042799","9783642042805"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04280-5_31","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}