[1] ATLURI V,HUANG W K.A Petri net based safety analysis of workflow authorization models[J].Journal of Computer Security,2000,8(2/3):209-240. [2] KNORR K,STORMER H.Modeling and analyzing separation of duties in workflow environments[A].Proceedings of 16th IFIP/SEC[C].London,U.K.:Royal Holloway,University of London,2001.199-212.
[3] FABIO C,SILVANA C,MARIA G F.Managing workflow authorization constraints through active database technology[J].Information Systems Frontiers,2001,3(3):319-338.
[4] JASON C.On the satisfiability of constraints in workflow systems[EB/OL].http://www.rhul.ac.uk/mathematics/techreports,2004-05-24.
[5] BERTINO E,FERRARI E,ATLURI V.An authorization model for supporting the specification and enforcement of authorization constraints in workflow management systems[J].ACM Transactions on Information and System Security,1999,2(1):65-104.
[6] LI Jianqiang,FAN Yushun.Petri net based performance analysis of workflow model[J].Journal of Computer Applications,2001,21(6):4-6,9(in Chinese).[李建强,范玉顺.基于Petri网的工作流模型性能分析方法[J].计算机应用,2001,21(6):4-6,9.]
|