{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:33:39Z","timestamp":1767652419124},"reference-count":46,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2020,5,27]]},"DOI":"10.1080\/17517575.2019.1704067","type":"journal-article","created":{"date-parts":[[2019,12,24]],"date-time":"2019-12-24T09:52:28Z","timestamp":1577181148000},"page":"611-640","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["RPMInter-work: a multi-agent approach for planning the task-role assignments in inter-organisational workflow"],"prefix":"10.1080","volume":"14","author":[{"given":"Meriam","family":"Jemel","sequence":"first","affiliation":[{"name":"LR11ES03 SMART Lab, Higher Institute of management, Tunis, Tunisia"}]},{"given":"Nadia","family":"Ben Azzouna","sequence":"additional","affiliation":[{"name":"LR11ES03 SMART Lab, Higher Institute of management, Tunis, Tunisia"}]},{"given":"Khaled","family":"Ghedira","sequence":"additional","affiliation":[{"name":"Central University of Tunisia, Honoris United Universities, Tunis, Tunisia"}]}],"member":"301","published-online":{"date-parts":[[2019,12,24]]},"reference":[{"key":"e_1_3_3_2_1","unstructured":"Abou El Kalam A. and Y. Deswarte. 2006. \u201cMulti-ORBAC a New Access Control Model for Distributed Heterogenous and Collaborative Systems.\u201d In Proceedings of the 8th International Symposuim on Systems and Information Security Sao Paulo Brazil 8\u201310."},{"key":"e_1_3_3_3_1","unstructured":"Ben Salah K. and K. Ghedira. 2002. \u201c Fondations of DOC-SAT .\u201d In Proceedings of the Workshop of distributed constraint reasonning in conjunction with Autonomous Agents and MultiAgent Systems Bologna Italy."},{"key":"e_1_3_3_4_1","doi-asserted-by":"crossref","unstructured":"Ben Salah K. and K. Ghedira. 2008. \u201cDOC: A New Multi-agent Approach for DCSP Resolution.\u201d In Proceedings of the 8th International Conference on New Technologies in Distributed Systems NOTERE \u201908 30 1\u201330 8. New York NY USA: ACM.","DOI":"10.1145\/1416729.1416767"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300837"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/asj.13133"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.03.008"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1093\/jjco\/hym003"},{"key":"e_1_3_3_9_1","first-page":"118","volume-title":"Communications and Multimedia Security","author":"Chernyavskiy D.","year":"2014","unstructured":"Chernyavskiy, D., and N. Miloslavskaya. 2014. \u201cAn Approach to Information Security Policy Modeling for Enterprise Networks.\u201d In Communications and Multimedia Security, edited by B. De Decker and A. Z\u00faquete, 118\u2013127. Berlin, Heidelberg: Springer Berlin Heidelberg."},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-015-9877-7"},{"key":"e_1_3_3_11_1","doi-asserted-by":"crossref","unstructured":"Crampton J. 2003. \u201cSpecifying and Enforcing Constraints in Role-based Access Control.\u201d In Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies SACMAT \u201903 New York NY USA: ACM 43\u201350.","DOI":"10.1145\/775418.775419"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2997655"},{"key":"e_1_3_3_13_1","unstructured":"Crampton J. A. V. Gagarin G. Gutin and M. Jones. 2015. \u201cOn the Workflow Satisfiability Problem with Class-Independent Constraints.\u201d In Proceedings of 10th International Symposium on Parameterized and Exact Computation Patras Greece 66\u201377."},{"key":"e_1_3_3_14_1","unstructured":"Crampton J. and G. Gutin. 2004. \u201cAn Algebraic Approach to the Analysis of Constrained Workflow Systems.\u201d In Proceedings of the 3rd Workshop on Foundations of Computer Security Turku Finland 61\u201374."},{"key":"e_1_3_3_15_1","doi-asserted-by":"crossref","unstructured":"Crampton J. G. Gutin and A. Yeo. 2012. \u201cOn the Parameterized Complexity of the Workflow Satisfiability Problem.\u201d In Proceedings of the 2012 ACM Conference on Computer and Communications Security Raleigh NC 857\u2013868.","DOI":"10.1145\/2382196.2382287"},{"key":"e_1_3_3_16_1","unstructured":"Crampton J. and M. Huth. 2011. \u201cSynthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods.\u201d In Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems Freiburg Germany 1\u201310."},{"key":"e_1_3_3_17_1","doi-asserted-by":"crossref","unstructured":"Crampton J. R. Crowston G. Gutin M. Jones and M. S. Ramanujan. 2013. \u201cFixed-Parameter Tractability of Workflow Satisfiability in the Presence of Seniority Constraints.\u201d In Proceedings of the 3rd Joint International Conference of Frontiers in Algorithmics and Algorithmic Aspects in Information and Management Dalian China 198\u2013209. .","DOI":"10.1007\/978-3-642-38756-2_21"},{"key":"e_1_3_3_18_1","doi-asserted-by":"crossref","unstructured":"Eder J. and A. Tahamtan. 2008. \u201cInformation Systems and e-Business Technologies: 2nd International United Information Systems Conference UNISCON 2008 Klagenfurt Austria April 22\u201325 \u201d 2008 Proceedings Chap. Temporal Consistency of View Based Interorganizational Workflows 96\u2013107. Berlin Heidelberg: Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-78942-0_11"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.51"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.08.004"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46135-3_44"},{"key":"e_1_3_3_22_1","unstructured":"Ferraiolo D. and R. Kuhn. 1992. \u201cRole-Based Access Controls.\u201d In Proceedings of the 15th National Computer Security Conference Baltimore Maryland 554\u2013563."},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.002"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/321296.321300"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0017442"},{"key":"e_1_3_3_28_1","unstructured":"Hubbe P. D. and E. C. Freuder. 1992. \u201cAn Efficient Cross Product Representation of the Constraint Satisfaction Problem Search Space.\u201d In Proceedings of the 3rd National Conference on Artificial Intelligence AAAI\u201992 San Jose CA 421\u2013427. AAAI Press."},{"key":"e_1_3_3_29_1","doi-asserted-by":"crossref","unstructured":"Jemel M. N. B. Azzouna and K. Ghedira. 2013. \u201cA Novel Approach for Dynamic Authorisation Planning in Constrained Workflow Systems.\u201d In Proceedings of the 6th International Conference on Security of Information and Networks Aksaray Turkey 388\u2013391.","DOI":"10.1145\/2523514.2523569"},{"key":"e_1_3_3_30_1","doi-asserted-by":"crossref","unstructured":"Jemel M. N. B. Azzouna and K. Ghedira. July 2015. \u201cECA Rules for Controlling Authorisation Plan to Satisfy Dynamic Constraints.\u201d In Proceedings of the\u00a013th Annual Conference on Privacy Security and Trust (PST) 2015 Izmir Turkey 133\u2013138.","DOI":"10.1109\/PST.2015.7232964"},{"key":"e_1_3_3_31_1","doi-asserted-by":"crossref","unstructured":"Jennings N. R. and M. Wooldridge. 1998. \u201cAgent Technology.\u201d In Chap. Applications of Intelligent Agents 3\u201328. Secaucus NJ USA: Springer-Verlag New York.","DOI":"10.1007\/978-3-662-03678-5_1"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/088395100117106"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701744861"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.08.005"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/1753193411419439"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.07.001"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00175-4"},{"key":"e_1_3_3_39_1","first-page":"64","article-title":"Separation of Duty Administration","volume":"27","author":"Perelson S.","year":"2001","unstructured":"Perelson, S., R. A. Botha, and J. H. P. Eloff. 2001. \u201cSeparation of Duty Administration.\u201d South African Computer Journal 27: 64\u201369.","journal-title":"South African Computer Journal"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2017.1355985"},{"key":"e_1_3_3_41_1","doi-asserted-by":"crossref","unstructured":"Reichert M. J. Kolb R. Bobrik and T. Bauer. March 2012. \u201cEnabling Personalized Visualization of Large Business Processes through Parameterizable Views.\u201d In Proceedings of the 27th ACM Symposium On Applied Computing (SAC\u201912) 9th Enterprise Engineering Track (EE\u201912) Trento Italy :ACM Press 1653\u20131660.","DOI":"10.1145\/2245276.2232043"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517570903045609"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.03.008"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-010-9180-y"},{"key":"e_1_3_3_46_1","doi-asserted-by":"crossref","unstructured":"Shen M. and D.-R. Liu. 2001. \u201cProceedings of 12th International Conference on Database and Expert Systems Applications\u201d Chap. Coordinating Interorganizational Workflows Based on Process-Views 274\u2013283. Berlin Heidelberg: Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-44759-8_28"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(95)00052-6"},{"key":"e_1_3_3_48_1","doi-asserted-by":"crossref","unstructured":"Takabi H. M. Amini and R. Jalili. 2007. \u201cEnhancing Role-Based Access Control Model through Fuzzy Relations.\u201d In Proceedings of the 3rd International Symposium on Information Assurance and Security 131\u2013136 \u00a0Manchester: IEEE Computer Society.","DOI":"10.1109\/ISIAS.2007.4299763"},{"issue":"35","key":"e_1_3_3_49_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1880022.1880034","article-title":"Satisfiability and Resiliency in Workflow Authorization Systems","volume":"40","author":"Wang Q.","year":"2010","unstructured":"Wang, Q., and N. Li. 2010. \u201cSatisfiability and Resiliency in Workflow Authorization Systems\u201d. ACM Transactions on Information and System Security 40 (35): 1\u201340.","journal-title":"ACM Transactions on Information and System Security"},{"key":"e_1_3_3_50_1","volume-title":"Enterprise Integration and Information Architecture: A Systems Perspective on Industrial Information Integration. Boston","author":"Xu L.","year":"2011","unstructured":"Xu, L. 2011. Enterprise Integration and Information Architecture: A Systems Perspective on Industrial Information Integration. Boston. MA, USA: Auerbach Publications."}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2019.1704067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:05:05Z","timestamp":1710248705000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2019.1704067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,24]]},"references-count":46,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,5,27]]}},"alternative-id":["10.1080\/17517575.2019.1704067"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2019.1704067","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,24]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-03-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}