{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:51:34Z","timestamp":1743054694833,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642284083"},{"type":"electronic","value":"9783642284090"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-28409-0_5","type":"book-chapter","created":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T12:32:28Z","timestamp":1347971548000},"page":"111-128","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-Aware Workflow Management"],"prefix":"10.1007","author":[{"given":"Bandar","family":"Alhaqbani","sequence":"first","affiliation":[]},{"given":"Michael","family":"Adams","sequence":"additional","affiliation":[]},{"given":"Colin J.","family":"Fidge","sequence":"additional","affiliation":[]},{"given":"Arthur H. M.","family":"ter Hofstede","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Enhydra Shark: Open source workflow, \n                    http:\/\/shark.ow2.org\/doc\/1.1\/index.html\n                   (accessed August 20, 2009)"},{"key":"5_CR2","unstructured":"jBPM user guide, \n                    http:\/\/docs.jboss.com\/jbpm\/v4.0\/userguide\n                   (accessed August 20, 2009)"},{"key":"5_CR3","unstructured":"ruote: Open source Ruby workflow engine, \n                    http:\/\/openwferu.rubyforge.org\/documentation.html\n                   (accessed August 20, 2009)"},{"key":"5_CR4","unstructured":"TIBCO BPM resource center, \n                    http:\/\/www.tibco.com\/solutions\/bpm\/default.jsp\n                   (accessed August 28, 2009)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-78238-4_38","volume-title":"Business Process Management Workshops","author":"B. Alhaqbani","year":"2008","unstructured":"Alhaqbani, B., Fidge, C.J.: Access Control Requirements for Processing Electronic Health Records. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol.\u00a04928, pp. 371\u2013382. Springer, Heidelberg (2008)"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1180367.1180378","volume-title":"Proceedings of the 3rd ACM Workshop on Secure Web Services","author":"A.H. Anderson","year":"2006","unstructured":"Anderson, A.H.: A comparison of two privacy policy languages: EPAL and XACML. In: Proceedings of the 3rd ACM Workshop on Secure Web Services, Alexandria, USA, November 3, pp. 53\u201360. ACM Press, New York (2006)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Atluri, V., Warner, J.: Security for workflow systems. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security: Application and Trends, pp. 213\u2013230. Springer (2008)","DOI":"10.1007\/978-0-387-48533-1_9"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0055860","volume-title":"Computer Security \u2013 ESORICS 98","author":"E. Bertino","year":"1998","unstructured":"Bertino, E., Buccafurri, F., Rullo, P.: An Authorization Model and Its Formal Semantics. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 127\u2013142. Springer, Heidelberg (1998)"},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Alturi, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security\u00a02(3), 65\u2013104 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"5_CR10","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.jnca.2008.02.021","volume":"32","author":"J. Cao","year":"2009","unstructured":"Cao, J., Chen, J., Zhao, H., Li, M.: A policy-based authorization model for workflow-enabled dynamic process management. Journal of Network and Computer Applications\u00a032(2), 412\u2013422 (2009)","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1023\/A:1011461409620","volume":"3","author":"F. Casati","year":"2001","unstructured":"Casati, F., Casanto, S., Fugini, M.: Managing workflow authorization constraints through active database technology. Information Systems Frontiers\u00a03(3), 319\u2013338 (2001)","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"5_CR12","first-page":"8","volume":"9","author":"P. Chhanabhai","year":"2007","unstructured":"Chhanabhai, P., Holt, A.: Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures. Medscape General Medicine\u00a09(1), 8 (2007)","journal-title":"Medscape General Medicine"},{"key":"5_CR13","unstructured":"Haplin, T.: Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design. Morgan Kaufmann Publishers (2001)"},{"key":"5_CR14","unstructured":"IBM. WebSphere business modeler, version 6.2.0, \n                    http:\/\/publib.boulder.ibm.com\/infocenter\/dmndhelp\/v6r2mx\/index.jsp?topic=\/com.ibm.btools.modeler.advanced.help.doc\/doc\/concepts\/modelelements\/processdiagram.html\n                   (accessed August 25, 2009)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-540-72863-4_63","volume-title":"Computer Supported Cooperative Work in Design III","author":"H. Jiang","year":"2007","unstructured":"Jiang, H., Lu, S.: Access Control for Workflow Environment: The RTFW Model. In: Shen, W., Luo, J., Lin, Z., Barth\u00e8s, J.-P.A., Hao, Q. (eds.) CSCWD. LNCS, vol.\u00a04402, pp. 619\u2013626. Springer, Heidelberg (2007)"},{"issue":"2","key":"5_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1053\/sonu.2002.32507","volume":"18","author":"E. Meier","year":"2002","unstructured":"Meier, E.: Medical privacy and its value for patients. Seminars in Oncology Nursing\u00a018(2), 105\u2013108 (2002)","journal-title":"Seminars in Oncology Nursing"},{"issue":"6","key":"5_CR17","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/S0306-4379(02)00029-7","volume":"28","author":"S. Oh","year":"2003","unstructured":"Oh, S., Park, S.: Task-role-based access control model. Information Systems\u00a028(6), 533\u2013562 (2003)","journal-title":"Information Systems"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/11568322_23","volume-title":"Conceptual Modeling \u2013 ER 2005","author":"N. Russell","year":"2005","unstructured":"Russell, N., ter Hofstede, A.H.M., Edmond, D., van der Aalst, W.M.P.: Workflow Data Patterns: Identification, Representation and Tool Support. In: Delcambre, L.M.L., Kop, C., Mayr, H.C., Mylopoulos, J., Pastor, \u00d3. (eds.) ER 2005. LNCS, vol.\u00a03716, pp. 353\u2013368. Springer, Heidelberg (2005)"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/11431855_16","volume-title":"Advanced Information Systems Engineering","author":"N. Russell","year":"2005","unstructured":"Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, \u00d3., Falc\u00e3o e Cunha, J. (eds.) CAiSE 2005. LNCS, vol.\u00a03520, pp. 216\u2013232. Springer, Heidelberg (2005)"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/S1386-5056(00)00135-0","volume":"62","author":"B. Sadan","year":"2001","unstructured":"Sadan, B.: Patient data confidentiality and patient rights. International Journal of Medical Informatics\u00a062, 41\u201349 (2001)","journal-title":"International Journal of Medical Informatics"},{"key":"5_CR21","unstructured":"Safian, S.C.: The Complete Diagnosis Coding Book. McGraw Hill Higher Education (2009)"},{"issue":"9","key":"5_CR22","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R.S. Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: Principles and practice. IEEE Communications Magazine\u00a032(9), 40\u201348 (1994)","journal-title":"IEEE Communications Magazine"},{"volume-title":"Modern Business Process Automation: YAWL and its Support Environment","year":"2009","key":"5_CR23","unstructured":"ter Hofstede, A.H.M., van der Aalst, W.M.P., Adams, M., Russell, N. (eds.): Modern Business Process Automation: YAWL and its Support Environment. Springer, Heidelberg (2009)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Thomas, R., Sandhu, R.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented autorization management. In: Lin, T.Y., Qian, S. (eds.) Proceedings of the IFIP TC11 WG11.3 11th International Conference on Database Security XI: Status and Prospects (DBSec 1997), Lake Tahoe, California, USA, August 10-13. IFIP, vol.\u00a0113, pp. 166\u2013181. Chapman & Hall (1997)","DOI":"10.1007\/978-0-387-35285-5_10"},{"key":"5_CR25","unstructured":"Wave-Front. FLOWer 3: Designers guide (2004)"},{"key":"5_CR26","unstructured":"Westin, A.: Privacy and Freedom. The Bodley Head Ltd. (1970)"},{"key":"5_CR27","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.sysarc.2008.10.002","volume":"55","author":"C. Wolter","year":"2009","unstructured":"Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirements specification. Journal of Systems Architecture\u00a055, 211\u2013223 (2009)","journal-title":"Journal of Systems Architecture"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-540-85758-7_18","volume-title":"Business Process Management","author":"J. Xu","year":"2008","unstructured":"Xu, J., Liu, C., Zhao, X.: Resource Allocation vs. Business Process Improvement: How They Impact on Each Other. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol.\u00a05240, pp. 228\u2013243. Springer, Heidelberg (2008)"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Yao, L., Kong, X., Xu, Z.: A task-role based access control model with multi-constraints. In: Kim, J., et al. (eds.) Proceedings of 4th International Conference on Networked Computing and Advanced Information Management (NCM 2008), Gyeongju, Korea, September 2-4, vol.\u00a01, pp. 137\u2013143. IEEE (2008)","DOI":"10.1109\/NCM.2008.75"}],"container-title":["Studies in Computational Intelligence","Business Process Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28409-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T04:16:20Z","timestamp":1674188180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28409-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642284083","9783642284090"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28409-0_5","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2013]]}}}