[1] ELISA B, ELENA F, ATLURI V. A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems[A]. Proceedings of the Second ACM Workshop on Role-Based Access Control\[C\]. New York, NY, USA: ACM Press, 1997. 1-12. [2] SANDHU R. Separation of duties in computerized information systems. Database Security IV: Status and Prospects. Holland, 1991.179-189.
[3] SANDHU R, COYNE E J, FEINSTEIN H L, et al. Role-based access control models[J]. IEEE Computer,1996, 29(2): 38-47.
[4] JONSCHER D, MOFFET J, DITTRICH K. Complex subjects or the striving for complexity is ruling our world\[A\]. Database Security VⅡ: Status and Prospects\[C\]. Amsterdam, Holland: Elsevier North-Holland, Inc., 1994.19-37.
[5] NYANCHAMA M, OSBORN S. Role-based security, object oriented databases and separation of duty[J]. SIGMOD Record,1993,22(4):45-51.
[6] AHN G J, SANDHU R. Role-based authorization constraints specification[J]. ACM Transactions on Information and System Security,2000,3(4):207-226.
[7] ATLURI V, HUANG W K. An uthorization model for workflows[A]. Proceedings of the 5th European Symposium on Research in Computer Security, Lecture Notes in Computer Science[C].London,U.K.: Springer-Verlag, 1996. 44-64.
[8] HUANG W K, ATlURI V. Secureflow: a secure Web-enabled workflow management systems[A]. Proceedings of the 4th ACM Workshop on Role-Based Access Control[C].New York, NY, USA: ACM Press, 1999. 83-94.
[9] ELISA B, ELENA F. The specification and enforcement of authorization constraints in workflow management systems[J]. ACM Transaction on Information and System Security,1999,2(1):65-104.
[10]WU Shengli, SHETH A, LUO Zongwei. Authorization and access control of application data in workflow systems[J]. Journal of Intelligent Information Systems, 2002,18(1): 71-94.
|