A Framework for Evidence Lifecycle Management, Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, pp.191-200, 2007. ,
DOI : 10.1007/978-3-540-77010-7_19
A secure workflow model, ACSW Frontiers '03: Proceedings of the Australasian information security workshop conference on ACSW frontiers, pp.33-41, 2003. ,
An execution model for multilevel seccure workflows, Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI, pp.151-165, 1998. ,
Workflow Resource Patterns: Identification, Representation and Tool Support, Proceedings of the Advanced Information Systems Engineering, 17th International Conference, pp.216-232, 2005. ,
DOI : 10.1007/11431855_16
Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.168-176, 2000. ,
DOI : 10.1109/ACSAC.2000.898870
Collaboration for Human-Centric eGovernment Workflows, Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, pp.201-212, 2007. ,
DOI : 10.1007/978-3-540-77010-7_20
URL : https://hal.archives-ouvertes.fr/inria-00182290
Specifying application-level security in workflow systems, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130), pp.346-351, 1998. ,
DOI : 10.1109/DEXA.1998.707423
Avoiding Policy-based Deadlocks in Business Processes, 2008 Third International Conference on Availability, Reliability and Security, pp.709-716, 2008. ,
DOI : 10.1109/ARES.2008.131
A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003. ,
DOI : 10.1145/937527.937530
The PERMIS X.509 role based privilege management infrastructure. SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies, pp.135-140, 2002. ,
Policy contexts: controlling information flow in parameterised RBAC, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, p.99, 2003. ,
DOI : 10.1109/POLICY.2003.1206964
PBDM, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.149-157, 2003. ,
DOI : 10.1145/775412.775431
Delegation in rolebased access control, Proceedings of the Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, pp.174-191, 2006. ,