{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:08Z","timestamp":1750306628653,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T00:00:00Z","timestamp":1382400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,22]]},"DOI":"10.1145\/2591888.2591892","type":"proceedings-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T14:18:30Z","timestamp":1398694710000},"page":"19-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["State based access control for open e-governance"],"prefix":"10.1145","author":[{"given":"Ankur","family":"Goel","sequence":"first","affiliation":[{"name":"International Institute of Information Technology, Hyderabad, India"}]},{"given":"Venkatesh","family":"Choppella","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology, Hyderabad, India"}]}],"member":"320","published-online":{"date-parts":[[2013,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/pic.dhe.ibm.com\/infocenter\/sr\/v7r5\/index.jsp?topic=%2Fcom.ibm.sr.doc%2Ftwsr_configrn_governance24.html. {Online","author":"Defining","year":"2013","unstructured":"Defining state based access controls. http:\/\/pic.dhe.ibm.com\/infocenter\/sr\/v7r5\/index.jsp?topic=%2Fcom.ibm.sr.doc%2Ftwsr_configrn_governance24.html. {Online ; accessed 2- Aug- 2013 }. Defining state based access controls. http:\/\/pic.dhe.ibm.com\/infocenter\/sr\/v7r5\/index.jsp?topic=%2Fcom.ibm.sr.doc%2Ftwsr_configrn_governance24.html. {Online; accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/drupal.org\/node\/408052. {Online","author":"Revisioning","year":"2013","unstructured":"Revisioning with state-based content access control. https:\/\/drupal.org\/node\/408052. {Online ; accessed 2- Aug- 2013 }. Revisioning with state-based content access control. https:\/\/drupal.org\/node\/408052. {Online; accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008656726700"},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/github.com\/ankur1990\/impl. {Online","author":"Goel Ankur","year":"2013","unstructured":"Ankur Goel . Prototype Implementation . https:\/\/github.com\/ankur1990\/impl. {Online ; accessed 2- Aug- 2013 }. Ankur Goel. Prototype Implementation. https:\/\/github.com\/ankur1990\/impl. {Online; accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/353692.353694"},{"key":"e_1_3_2_1_6_1","first-page":"583","volume-title":"Proc. of the 24th IASTED International Conference on Modelling, Identification, and Control, CD-ROM","author":"Beer D.","year":"2005","unstructured":"D. Beer , S. H\u00f6hne , H. Petersohn , T. P\u00f6hnitzsch , G. R\u00fcnger , and M. Voigt . Designing a distributed workflow system for e-government . In Proc. of the 24th IASTED International Conference on Modelling, Identification, and Control, CD-ROM , pages 583 -- 588 , 2005 . D. Beer, S. H\u00f6hne, H. Petersohn, T. P\u00f6hnitzsch, G. R\u00fcnger, and M. Voigt. Designing a distributed workflow system for e-government. In Proc. of the 24th IASTED International Conference on Modelling, Identification, and Control, CD-ROM, pages 583--588, 2005."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2006.21"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/266741.266746"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300837"},{"key":"e_1_3_2_1_10_1","volume-title":"A framework for access control in workflow systems. Information management & computer security, 9(3):126--133","author":"Botha R. A.","year":"2001","unstructured":"R. A. Botha and J. H. Eloff . A framework for access control in workflow systems. Information management & computer security, 9(3):126--133 , 2001 . R. A. Botha and J. H. Eloff. A framework for access control in workflow systems. Information management & computer security, 9(3):126--133, 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32257-3_12"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295160"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/151646.151648"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/944217.944234"},{"key":"e_1_3_2_1_15_1","first-page":"554","volume-title":"15th NIST-NCSC National Computer Security Conference","author":"Ferraiolo D.","year":"1992","unstructured":"D. Ferraiolo and R. Kuhn . Role-based access control . In 15th NIST-NCSC National Computer Security Conference , pages 554 -- 563 , 1992 . D. Ferraiolo and R. Kuhn. Role-based access control. In 15th NIST-NCSC National Computer Security Conference, pages 554--563, 1992."},{"key":"e_1_3_2_1_16_1","volume-title":"Towards a semantic-based verification environment for the pi-calculus","author":"Ferrari G.","year":"1995","unstructured":"G. Ferrari , G. Modoni , and P. Quaglia . Towards a semantic-based verification environment for the pi-calculus . 1995 . G. Ferrari, G. Modoni, and P. Quaglia. Towards a semantic-based verification environment for the pi-calculus. 1995."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/T4E.2012.60"},{"key":"e_1_3_2_1_18_1","unstructured":"Government of India. Public grievance process channels. http:\/\/www.pgportal.gov.in\/Channels.aspx. {Online; accessed 2-Aug-2013}.  Government of India. Public grievance process channels. http:\/\/www.pgportal.gov.in\/Channels.aspx. {Online; accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_19_1","unstructured":"Government of India. RTI Passport Application Process. http:\/\/passportindia.gov.in\/AppOnlineProject\/pdf\/RTI.pdf. {Online; accessed 2-Aug-2013}.  Government of India. RTI Passport Application Process. http:\/\/passportindia.gov.in\/AppOnlineProject\/pdf\/RTI.pdf. {Online; accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_20_1","unstructured":"Government of India. Right to Information Act. http:\/\/rti.gov.in\/rti-act.pdf 2011. {Online;accessed 2-Aug-2013}.  Government of India. Right to Information Act. http:\/\/rti.gov.in\/rti-act.pdf 2011. {Online;accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_21_1","volume-title":"The structural transformation of the public sphere: An inquiry into a category of bourgeois society","author":"Habermas J.","year":"1991","unstructured":"J. Habermas . The structural transformation of the public sphere: An inquiry into a category of bourgeois society . MIT press , 1991 . J. Habermas. The structural transformation of the public sphere: An inquiry into a category of bourgeois society. MIT press, 1991."},{"key":"e_1_3_2_1_22_1","unstructured":"D. Jordan and J. Evdemon. Web services business process execution language version 2.0. http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/OS\/wsbpel-v2.0-OS.pdf 2007. {Online; accessed 2-Aug-2013}.  D. Jordan and J. Evdemon. Web services business process execution language version 2.0. http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/OS\/wsbpel-v2.0-OS.pdf 2007. {Online; accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894193"},{"key":"e_1_3_2_1_24_1","volume-title":"Open government: Collaboration, transparency, and participation in practice","author":"Lathrop D.","year":"2010","unstructured":"D. Lathrop and L. Ruma . Open government: Collaboration, transparency, and participation in practice . O'Reilly Media , 2010 . D. Lathrop and L. Ruma. Open government: Collaboration, transparency, and participation in practice. O'Reilly Media, 2010."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-15670-4_10"},{"key":"e_1_3_2_1_26_1","volume-title":"the pi calculus","author":"Milner R.","year":"1999","unstructured":"R. Milner . Communicating and mobile systems : the pi calculus . Cambridge university press , 1999 . R. Milner. Communicating and mobile systems: the pi calculus. Cambridge university press, 1999."},{"key":"e_1_3_2_1_27_1","volume-title":"SIGEGOV","author":"Mohapatra S. K.","year":"2006","unstructured":"S. K. Mohapatra , D. K. Das , B. Das , J. P. Bakshi , and S. K. Panda . Workflow based e-governance applications: Case study of WF-Bhulekh. In Towards Next Generation E-government , SIGEGOV , 2006 . S. K. Mohapatra, D. K. Das, B. Das, J. P. Bakshi, and S. K. Panda. Workflow based e-governance applications: Case study of WF-Bhulekh. In Towards Next Generation E-government, SIGEGOV, 2006."},{"key":"e_1_3_2_1_28_1","unstructured":"National Knowledge Commission. Recommendations on E-governance. http:\/\/pib.nic.in\/archieve\/others\/2006\/may2006\/nkc20060509.pdf 2006. {Online; accessed 2-Aug-2013}.  National Knowledge Commission. Recommendations on E-governance. http:\/\/pib.nic.in\/archieve\/others\/2006\/may2006\/nkc20060509.pdf 2006. {Online; accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_29_1","unstructured":"United Nations. Millennium development goals. http:\/\/un.org\/special-rep\/ohrlls\/lldc\/MDGs.pdf 2000. {Online; accessed 2-Aug-2013}.  United Nations. Millennium development goals. http:\/\/un.org\/special-rep\/ohrlls\/lldc\/MDGs.pdf 2000. {Online; accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_30_1","first-page":"157","volume-title":"Proceedings of the 6th International EGOV Conference","volume":"1","author":"Ojo A.","year":"2007","unstructured":"A. Ojo , T. Janowski , and E. Estevez . Domain models and enterprise application framework for developing electronic public services . In Proceedings of the 6th International EGOV Conference , Regensburg, Germany , volume 1 , pages 157 -- 164 , 2007 . A. Ojo, T. Janowski, and E. Estevez. Domain models and enterprise application framework for developing electronic public services. In Proceedings of the 6th International EGOV Conference, Regensburg, Germany, volume 1, pages 157--164, 2007."},{"key":"e_1_3_2_1_31_1","volume-title":"National frameworks' survey on standardization of e-government documents and processes for interoperability. Journal of theoretical and applied electronic commerce research, 3(3):64--82","author":"Pankowska M.","year":"2008","unstructured":"M. Pankowska . National frameworks' survey on standardization of e-government documents and processes for interoperability. Journal of theoretical and applied electronic commerce research, 3(3):64--82 , 2008 . M. Pankowska. National frameworks' survey on standardization of e-government documents and processes for interoperability. Journal of theoretical and applied electronic commerce research, 3(3):64--82, 2008."},{"key":"e_1_3_2_1_32_1","first-page":"1","article-title":"Open government principle: Applying the right to know under the constitution","volume":"26","author":"Parks W.","year":"1957","unstructured":"W. Parks . Open government principle: Applying the right to know under the constitution . The George Washington Law Review , 26 : 1 -- 22 , 1957 . W. Parks. Open government principle: Applying the right to know under the constitution. The George Washington Law Review, 26:1--22, 1957.","journal-title":"The George Washington Law Review"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052220.1052283"},{"key":"e_1_3_2_1_34_1","volume-title":"Petri net-based modelling of workflow systems: An overview. European journal of operational research, 134(3):664--676","author":"Salimifard K.","year":"2001","unstructured":"K. Salimifard and M. Wright . Petri net-based modelling of workflow systems: An overview. European journal of operational research, 134(3):664--676 , 2001 . K. Salimifard and M. Wright. Petri net-based modelling of workflow systems: An overview. European journal of operational research, 134(3):664--676, 2001."},{"key":"e_1_3_2_1_35_1","volume-title":"The application of petri nets to workflow management. Journal of circuits, systems, and computers, 8(01):21--66","author":"van der Aalst W. M.","year":"1998","unstructured":"W. M. van der Aalst . The application of petri nets to workflow management. Journal of circuits, systems, and computers, 8(01):21--66 , 1998 . W. M. van der Aalst. The application of petri nets to workflow management. Journal of circuits, systems, and computers, 8(01):21--66, 1998."},{"key":"e_1_3_2_1_36_1","volume-title":"http:\/\/drupal.org\/project\/workflow. {Online","author":"VanDyk J.","year":"2013","unstructured":"J. VanDyk . Workflow module in drupal. http:\/\/drupal.org\/project\/workflow. {Online ; accessed 2- Aug- 2013 }. J. VanDyk. Workflow module in drupal. http:\/\/drupal.org\/project\/workflow. {Online; accessed 2-Aug-2013}."},{"key":"e_1_3_2_1_37_1","volume-title":"A light modelling framework for e-government service workflows. Electronic Government, an International Journal, 1(4):420--438","author":"Verginadis G.","year":"2004","unstructured":"G. Verginadis and G. Mentzas . A light modelling framework for e-government service workflows. Electronic Government, an International Journal, 1(4):420--438 , 2004 . G. Verginadis and G. Mentzas. A light modelling framework for e-government service workflows. Electronic Government, an International Journal, 1(4):420--438, 2004."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/319171.319179"},{"key":"e_1_3_2_1_39_1","first-page":"2008","volume-title":"Introduction to BPMN. IBM Cooperation","author":"White S. A.","year":"2004","unstructured":"S. A. White . Introduction to BPMN. IBM Cooperation , pages 2008 -- 2029 , 2004 . S. A. White. Introduction to BPMN. IBM Cooperation, pages 2008--029, 2004."},{"key":"e_1_3_2_1_40_1","first-page":"265","article-title":"Process modeling notations and workflow patterns","volume":"2004","author":"White S. A.","year":"2004","unstructured":"S. A. White . Process modeling notations and workflow patterns . Workflow Handbook , 2004 : 265 -- 294 , 2004 . S. A. White. Process modeling notations and workflow patterns. Workflow Handbook, 2004:265--294, 2004.","journal-title":"Workflow Handbook"},{"key":"e_1_3_2_1_41_1","first-page":"197","article-title":"Modelling security goals in business processes","volume":"127","author":"Wolter C.","year":"2008","unstructured":"C. Wolter , M. Menzel , and C. Meinel . Modelling security goals in business processes . Proc. GI Modellierung , 127 : 197 -- 212 , 2008 . C. Wolter, M. Menzel, and C. Meinel. Modelling security goals in business processes. Proc. GI Modellierung, 127:197--212, 2008.","journal-title":"Proc. GI Modellierung"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1793114.1793121"},{"key":"e_1_3_2_1_43_1","first-page":"243","volume-title":"FORTE","volume":"6","author":"Yi W.","year":"1994","unstructured":"W. Yi , P. Pettersson , and M. Daniels . Automatic verification of real-time communicating systems by constraint-solving . In FORTE , volume 6 , pages 243 -- 258 , 1994 . W. Yi, P. Pettersson, and M. Daniels. Automatic verification of real-time communicating systems by constraint-solving. In FORTE, volume 6, pages 243--258, 1994."}],"event":{"name":"ICEGOV '13: 7th International Conference on Theory and Practice of Electronic Governance","sponsor":["International Institute for Software Technology of the United Nations University International Institute for Software Technology of the United Nations University","NIA National Information Society Agency, Republic of Korea","MOPAS Ministry of Public Administration and Security"],"location":"Seoul Republic of Korea","acronym":"ICEGOV '13"},"container-title":["Proceedings of the 7th International Conference on Theory and Practice of Electronic Governance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591888.2591892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591888.2591892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:45Z","timestamp":1750229745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591888.2591892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,22]]},"references-count":43,"alternative-id":["10.1145\/2591888.2591892","10.1145\/2591888"],"URL":"https:\/\/doi.org\/10.1145\/2591888.2591892","relation":{},"subject":[],"published":{"date-parts":[[2013,10,22]]},"assertion":[{"value":"2013-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}