{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T08:36:19Z","timestamp":1742632579849},"reference-count":20,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2002,10,1]],"date-time":"2002-10-01T00:00:00Z","timestamp":1033430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[2002,10]]},"DOI":"10.1016\/s0169-023x(02)00058-7","type":"journal-article","created":{"date-parts":[[2002,10,14]],"date-time":"2002-10-14T15:12:20Z","timestamp":1034608340000},"page":"1-27","source":"Crossref","is-referenced-by-count":6,"title":["AutoWF\u2013\u2013A secure Web workflow system using autonomous objects"],"prefix":"10.1016","volume":"43","author":[{"given":"Ehud","family":"Gudes","sequence":"first","affiliation":[]},{"given":"Aharon","family":"Tubman","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0169-023X(02)00058-7_BIB1","series-title":"Proceedings of the 10th IFIP WG 11.3 Working Conference on Database Security, Como, Italy, July","first-page":"199","article-title":"An extended Petri net model for supporting workflows in a multilevel secure environment","author":"Atluri","year":"1996"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB2","series-title":"11th IFIP Working Conference on Database Security, August 1997, and Database Security, XI: Status and Prospects","first-page":"151","article-title":"An execution model for multilevel secure workflows","author":"Atluri","year":"1998"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB3","doi-asserted-by":"crossref","unstructured":"S. Castano, M.G. Fugini, Rules and patterns for security in workflow system. IFIP WG 11.3, Database Security Workshop, Greece, 1998","DOI":"10.1007\/978-0-387-35564-1_4"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB4","unstructured":"S. Das, K. Kochut, J. Miller, A. Sheth, D. Worah, ORBWork: A reliable distributed CORBA-based workflow enactment system for METEOR_2, Technical Report UGA-CS-TR97-001, Department of Computer Science, University of Georgia, February 1997"},{"issue":"8","key":"10.1016\/S0169-023X(02)00058-7_BIB5","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1145\/360933.360975","article-title":"Guarded commands, nondeterminacy, and formal derivation of programs","volume":"18","author":"Dijkstra","year":"1975","journal-title":"Communication of the ACM"},{"issue":"2","key":"10.1016\/S0169-023X(02)00058-7_BIB6","doi-asserted-by":"crossref","DOI":"10.1007\/BF01277643","article-title":"An overview of workflow management: From process modeling to workflow automation infrastructure","volume":"3","author":"Georgakopoulos","year":"1995","journal-title":"Distributed and Parallel Databases"},{"issue":"4","key":"10.1016\/S0169-023X(02)00058-7_BIB7","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-1999-7403","article-title":"Modeling specifying and implementing workflow security in cyberspace","volume":"7","author":"Gudes","year":"1999","journal-title":"Journal of Computer Security"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB8","doi-asserted-by":"crossref","unstructured":"E. Gudes, R.P. van de Riet, J.F.M. Burg, M.S. Oliver, Alter-egos and roles supporting workflow security in cyberspace, in: Proceedings of IFIP WG 11.3 Workshop on Database Security, Lake Taho, 1997","DOI":"10.1007\/978-0-387-35285-5_11"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB9","unstructured":"W.-K. Huang, V. Atluri, Analizing the safety of workflow authorization models, in: IFIP TC11 WG 11.3 12th International Conference on Database Security, Chalkidiki, Greece, 1998"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB10","unstructured":"A. Kemper, P.C. Lockeman, G. Moerkotte, H.D. Walter, Autonomy over ubiquity: Coping with the complexity of a distributed world, in: Proceedings of the 9th International Conference on Entity Relationship Approach, Lausanne, 1990"},{"issue":"2","key":"10.1016\/S0169-023X(02)00058-7_BIB11","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/BF00962976","article-title":"Autonomous objects: A natural model for complex applications","volume":"3","author":"Kemper","year":"1994","journal-title":"Journal of Intelligent Information Systems (JIIS)"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB12","unstructured":"N. Krivokapic, S. Grieser, M. Islinger, M. Keidl, S. Prols, S. Seeltzam, A. Kemper, AutO\u2013\u2013A distributed system of autonomous objects, Technical report, University Passau, Germany, 1996"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB13","series-title":"Database Security, VIII, Status and Prospects","first-page":"223","article-title":"The integration of security and integrity constraints in Mokum","author":"Van de Riet","year":"1994"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB14","series-title":"Proceedings of WebNet 96, San Francisco","first-page":"462","article-title":"Modeling Alter-egos in cyberspace: Who is responsible?","author":"van de Riet","year":"1996"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB15","unstructured":"E. Gudes, R.P. van de Riet, An object-oriented database architecture for providing high-level security in cyberspace, in: Proceedings of the 10th IFIP WG 11.3 Working conference on Database Security, Como, Italy, July, 1996"},{"issue":"2","key":"10.1016\/S0169-023X(02)00058-7_BIB16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"IEEE Computer"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB17","doi-asserted-by":"crossref","unstructured":"R.S. Sandhu, Role hierarchies and constraints for lattice based access controls, in: Proceedings of the 4th European Symposium on Research in Computer Security, Rome, Italy, September, 1996","DOI":"10.1007\/3-540-61770-1_28"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB18","unstructured":"A. Tubman, Security in workflow management systems, Master thesis, Ben-Gurion University, Beer-Sheva, Israel, 2000"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB19","unstructured":"Workflow management coalition terminology and glossary, Available from <http:\/\/www.aiim.org\/wfmc\/mainframe.htm>"},{"key":"10.1016\/S0169-023X(02)00058-7_BIB20","unstructured":"Z Notation final Committee Draft, CD 13568.2, 1999, Available from <http:\/\/www.afm.sbu.ac.uk\/z\/>"}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X02000587?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X02000587?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T14:12:55Z","timestamp":1583417575000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X02000587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,10]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2002,10]]}},"alternative-id":["S0169023X02000587"],"URL":"https:\/\/doi.org\/10.1016\/s0169-023x(02)00058-7","relation":{},"ISSN":["0169-023X"],"issn-type":[{"value":"0169-023X","type":"print"}],"subject":[],"published":{"date-parts":[[2002,10]]}}}