{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:28:15Z","timestamp":1725672495010},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642292309"},{"type":"electronic","value":"9783642292316"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29231-6_5","type":"book-chapter","created":{"date-parts":[[2012,4,3]],"date-time":"2012-04-03T05:49:29Z","timestamp":1333432169000},"page":"51-63","source":"Crossref","is-referenced-by-count":4,"title":["An Extended RBAC Model for Task Delegation in Workflow Systems"],"prefix":"10.1007","author":[{"given":"Khaled","family":"Gaaloul","sequence":"first","affiliation":[]},{"given":"Erik","family":"Proper","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois","family":"Charoy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Atluri, V., Warner, J.: Supporting conditional delegation in secure workflow management systems. In: SACMAT 2005: The Tenth ACM Symposium on Access Control Models and Technologies, New York, NY, USA, pp. 49\u201358 (2005)","DOI":"10.1145\/1063979.1063990"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Crampton, J., Khambhammettu, H.: On delegation and workflow execution models. In: SAC 2008: Proceedings of the 2008 ACM Symposium on Applied Computing, pp. 2137\u20132144. ACM, New York (2008)","DOI":"10.1145\/1363686.1364199"},{"issue":"2","key":"5_CR3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"5_CR4","unstructured":"Gaaloul, K.: A Secure Framework for Dynamic Task Delegation in Workflow Management Systems, Ph.D. thesis, The University of Henri Poincar\u00e9, Nancy, France (2010)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11863908_12","volume-title":"Computer Security \u2013 ESORICS 2006","author":"J. Crampton","year":"2006","unstructured":"Crampton, J., Khambhammettu, H.: Delegation in Role-Based Access Control. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 174\u2013191. Springer, Heidelberg (2006)"},{"key":"5_CR6","first-page":"168","volume-title":"Proceedings of the 16th Annual Computer Security Applications Conference","author":"E. Barka","year":"2000","unstructured":"Barka, E., Sandhu, R.: Framework for role-based delegation models. In: Proceedings of the 16th Annual Computer Security Applications Conference, pp. 168\u2013176. IEEE Computer Society, Washington, DC, USA (2000)"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/775412.775431","volume-title":"SACMAT 2003: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies","author":"X. Zhang","year":"2003","unstructured":"Zhang, X., Oh, S., Sandhu, R.: PBDM: a flexible delegation model in RBAC. In: SACMAT 2003: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, pp. 149\u2013157. ACM Press, New York (2003)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/11431855_16","volume-title":"Advanced Information Systems Engineering","author":"N. Russell","year":"2005","unstructured":"Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow Resource Patterns: Identification, Representation and Tool Support. In: Pastor, \u00d3., Falc\u00e3o e Cunha, J. (eds.) CAiSE 2005. LNCS, vol.\u00a03520, pp. 216\u2013232. Springer, Heidelberg (2005)"},{"key":"5_CR9","unstructured":"Zur\u00a0Muehlen, M.: Workflow-based Process Controlling. Foundation, Design, and Application of workflow-driven Process Information Systems. Logos Verlag, Berlin (2004)"},{"issue":"9","key":"5_CR10","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/130994.130998","volume":"35","author":"B. Curtis","year":"1992","unstructured":"Curtis, B., Kellner, M.I., Over, J.: Process modeling. Commun. ACM\u00a035(9), 75\u201390 (1992)","journal-title":"Commun. ACM"},{"key":"5_CR11","unstructured":"WFMC, The Workflow Management Coalition: Workflow Management Coalition Terminology and Glossary (1999); Document Number WFMC-TC-1011"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1377836.1377842","volume-title":"SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies","author":"J. Crampton","year":"2008","unstructured":"Crampton, J., Khambhammettu, H.: Delegation and satisfiability in workflow systems. In: SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 31\u201340. ACM, New York (2008)"},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1147\/sj.403.0666","volume":"40","author":"R.A. Botha","year":"2001","unstructured":"Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal\u00a040(3), 666\u2013682 (2001)","journal-title":"IBM Systems Journal"},{"key":"5_CR14","unstructured":"Moses, T.: eXtensible Access Control Markup Language (XACML) Version 2.0, Committee specification, OASIS (2005)"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/507711.507732","volume-title":"SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies","author":"D.W. Chadwick","year":"2002","unstructured":"Chadwick, D.W., Otenko, A.: The permis x.509 role based privilege management infrastructure. In: SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 135\u2013140. ACM, New York (2002)"},{"issue":"2","key":"5_CR16","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10207-008-0073-y","volume":"8","author":"D.W. Chadwick","year":"2009","unstructured":"Chadwick, D.W., Otenko, S., Nguyen, T.A.: Adding support to xacml for multi-domain user to user dynamic delegation of authority. Int. Journal Information Security\u00a08(2), 137\u2013152 (2009)","journal-title":"Int. Journal Information Security"},{"key":"5_CR17","first-page":"166","volume-title":"Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI","author":"R.K. Thomas","year":"1998","unstructured":"Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management. In: Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI, pp. 166\u2013181. Chapman & Hall, Ltd., London (1998)"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/266741.266748","volume-title":"RBAC 1997: Proceedings of the Second ACM Workshop on Role-Based Access Control","author":"R.K. Thomas","year":"1997","unstructured":"Thomas, R.K.: Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments. In: RBAC 1997: Proceedings of the Second ACM Workshop on Role-Based Access Control, pp. 13\u201319. ACM, New York (1997)"},{"key":"5_CR19","first-page":"49","volume-title":"GRID 2005: Proceedings of the 6th IEEE\/ACM International Workshop on Grid Computing","author":"L. Seitz","year":"2005","unstructured":"Seitz, L., Rissanen, E., Sandholm, T., Firozabadi, B.S., Mulmo, O.: Policy administration control and delegation using xacml and delegent. In: GRID 2005: Proceedings of the 6th IEEE\/ACM International Workshop on Grid Computing, pp. 49\u201354. IEEE Computer Society, Washington, DC, USA (2005)"}],"container-title":["Lecture Notes in Business Information Processing","Workshops on Business Informatics Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29231-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:13:33Z","timestamp":1558394013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29231-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642292309","9783642292316"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29231-6_5","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}